Chapter 23 – configuring ssh, Introduction, Ssh fundamentals – RuggedCom RuggedRouter RX1000 User Manual

Page 220: Included with ssh

Advertising
background image

RuggedRouter

User Guide

Chapter 23 – Configuring SSH

Introduction

This chapter familiarizes the user with:

Configuring SSH Authentication

SSH Networking And Access Control

Setting SSH Client Options

SSH Fundamentals

Secure Shell is a program to allow logging into another host, to remotely execute
commands, and to move files from one machine to another. It provides strong
authentication and secure communications over insecure channels. The program that
accepts the SSH client's connection is an SSH server. The SSH server can be
programmed to enforce conditions to increase security. These conditions can be
imposed upon specific hosts or upon all hosts in general.
SSH has had two major revisions of the protocol upon which it is based, SSH v1 and
v2. SSH v1 relied upon the RSA authentication scheme, while SSH v2 relies upon
RSA or DSA. SSH v1 is known to be insecure and should not be used.
SSH operates upon TCP port 23 by default. Open this port if you use a firewall.
SSH also provides TCP forwarding, a means to forward otherwise insecure TCP
traffic through SSH Secure Shell.

Included With SSH

Your RuggedRouter software includes scp, an SSH utility to perform secure copying
of files and directories over the network.
If you decide to create you own user accounts, the ssh-keygen utility can be used to
populate the account with SSH keys.

218 RuggedCom

Advertising