Comtech EF Data SLM-5650A Installation And Operation Manual page 259

Satellite modem
Hide thumbs Also See for SLM-5650A:
Table of Contents

Advertisement

SLM-5650A Satellite Modem
TRANSEC Module HTTPS Interface
Network Parameters
Item
Secure Management IP
Subnet Bits
Gateway IP
Click [Update Settings] to apply changes made to any of these parameters.
Crypto Officer Credentials
This section is used to create a TRANSEC Module Crypto Officer Username and Crypto
Officer Password. Note that are each restricted to a minimum of 7 and a maximum of 25
characters, excluding : (ASCII Code 58), < (ASCII Code 60), > (ASCII Code 62), " (ASCII Code
34), and ~ (ASCII Code 126).
The default for both the Crypto Officer Username and Password is comtech.
Item
Crypto Officer Username
Password
Confirm Password
Once the Username is entered and the Password is confirmed, click [Update Credentials] to
finalize this update.
SSH (Secure Shell) Console
Item
Host Key Signature
Description
Allows users to change the IP address of the TRANSEC Module to suit their own
operational environment.
NOTE: If this text box changes, it will be necessary to repeat the process in Section
10.3, using the newly-designated IP address, to regain access to the TRANSEC Web
Interface.
Allows users to modify the IP subnet mask of the TRANSEC Module to suit their own
operational environment.
Allows users to modify the default gateway of the TRANSEC Module to suit their own
operational environment.
NOTE: The IP address entered in the text box must match the subnet of the Secure
Management IP. If it does not then the Gateway IP text box will default to 0.0.0.0.
Description
Use this text box to create the desired username.
Use this text box to create the desired password for the username being created.
Use this text box to re-enter the previously entered password.
Description
This key signature, or fingerprint, helps to identify the TRANSEC Module when
connecting through SSH. SSH clients typically show the host key signature when they
connect to a system for the first time. The user can then compare the host key the
SSH client shows with the host key the TRANSEC Module displays to verify that they
are the same.
Click [Generate New Host Key] to generate a new host key that uniquely identifies the
TRANSEC Module. After doing this, SSH clients that have connected to the TRANSEC
Module before will usually note or warn that the host key has changed when they
connect again.
10–9
Revision 8
MN-SLM5650A

Advertisement

Table of Contents
loading

Table of Contents