NetComm NTC-140-02 User Manual page 122

Hide thumbs Also See for NTC-140-02:
Table of Contents

Advertisement

SSH key management
Secure Shell (SSH) is UNIX-based command interface and network protocol used to gain secure access to a remote computer,
execute commands on a remote machine or to transfer files between machines. It was designed as a replacement for Telnet and
other insecure remote shell protocols which send information, including passwords, as plain text.
SSH uses RSA public key cryptography for both connection and authentication. Two common ways of using SSH are:
Use automatically generated public-private key pairs to encrypt the network connection and then use password
authentication to log on.
Use a manually generated public-private key pair to perform the authentication and allow users or programs to log in
without using a password.
To access the SSH key management page, click on the System menu then the Administration menu on the left and then click on
SSH key management.
SSH Server Configuration
To configure the SSH server settings:
1.
Use the SSH Protocol drop down list to select the protocol that you want to use. Protocol 2 is more recent and is
considered more secure.
2.
Select the types of authentication you want to use by clicking the Enable password authentication and Enable key
authentication toggle keys on or off. Note that you may have both authentication methods on but you may not turn them
both off.
3.
Click the Save button to confirm your settings.
NetComm Wireless 4G M2M Router
122
Figure 124 - SSH Server Configuration
www.netcommwireless.com
UM-00012 v1.0

Advertisement

Table of Contents
loading

Table of Contents