Comtech EF Data SLM-5650A Installation And Operation Manual page 344

Hide thumbs Also See for SLM-5650A:
Table of Contents

Advertisement

Click [Submit] to apply this setting. More specifically:
When Management Security is set to Low Level Security, the NP Interface can be
managed by non-secure protocols such as HTTP and Telnet.
When Management Security is set to High Level Security, the following restrictions apply:
o
o
o
You may also change Management Security via the SLM-5650A front panel:
SELECT: Configure  Remote  EthernetConfig  Option Card Addr  Network
Proc  Security
SSH (Secure Shell)
SSH Host Key: This key signature, or fingerprint, helps to identify the NP when connecting through
SSH. SSH clients typically show the host key signature when they connect to a system for the first
time. The host key the SSH client shows can then be compared with the host key the NP displays
to verify that they are the same.
Click [Generate New Host Key] to generate a new host key that uniquely identifies the NP. After
doing this, SSH clients that have connected to the NP before will usually note or warn that the host
key has changed when they connect again.
Appendix E
The NP Interface can ONLY be managed via the secure HTTPS protocol – the
https:// address prefix must be specified in order to connect to the secure NP
HTTPS Interface.
Access via Telnet is not permitted – however, while access to the CLI is not
permitted via the Telnet interface, the CLI is accessible via the SSH interface;
Access to the SLM-5650A HTTP and FTP server is disabled since non-secure
protocols are used.
E–22
SLM-5650A Satellite Modem
Revision 10
MN-SLM-5650A

Advertisement

Table of Contents
loading

Table of Contents