Ssh Key Management - NetComm NWL-15 User Manual

Light industrial m2m router plus
Hide thumbs Also See for NWL-15:
Table of Contents

Advertisement

SSH key management

Secure Shell (SSH) is UNIX-based command interface and network protocol used to gain secure access to a remote computer,
execute commands on a remote machine or to transfer files between machines. It was designed as a replacement for Telnet and
other insecure remote shell protocols which send information, including passwords, as plain text.
SSH uses RSA public key cryptography for both connection and authentication. Two common ways of using SSH are:
Use automatically generated public-private key pairs to encrypt the network connection and then use password
authentication to log on.
Use a manually generated public-private key pair to perform the authentication and allow users or programs to log in
without using a password.
SSH server configuration
To configure the SSH server settings:
1.
Use the SSH Protocol drop down list to select the protocol that you want to use. Protocol 2 is more recent and is
considered more secure.
2.
Select the types of authentication you want to use by clicking the Enable Password Authentication and Enable key
Authentication toggle keys on or off. Note that you may have both authentication methods on but you may not turn them
both off.
3.
Click the Save button to confirm your settings.
www.netcommwireless.com
Figure 119 - SSH Server Configuration
NetComm Wireless Light Industrial M2M Router Plus
113

Advertisement

Table of Contents
loading

Table of Contents