Chapter 26 - Configuring SSH
Chapter 26 - Configuring SSH
Introduction
This chapter familiarizes the user with:
• Configuring SSH Authentication
• SSH Networking And Access Control
• Setting SSH Client Options
SSH Fundamentals
Secure Shell is a program to allow logging into another host, to remotely execute
commands, and to move files from one machine to another. It provides strong
authentication and secure communications over insecure channels. The program that
accepts the SSH client's connection is an SSH server. The SSH server can be
programmed to enforce conditions to increase security. These conditions can be
imposed upon specific hosts or upon all hosts in general.
SSH has had two major revisions of the protocol upon which it is based, SSH v1 and
v2. SSH v1 relied upon the RSA authentication scheme, while SSH v2 relies upon
RSA or DSA. SSH v1 is known to be insecure and should not be used.
SSH operates upon TCP port 23 by default. Open this port if you use a firewall.
SSH also provides TCP forwarding, a means to forward otherwise insecure TCP
traffic through SSH Secure Shell.
Included With SSH
Your RuggedRouter software includes scp, an SSH utility to perform secure copying
of files and directories over the network.
If you decide to create you own user accounts, the ssh-keygen utility can be used to
populate the account with SSH keys.
SSH Configuration
SSH Main Menu
Figure 204: SSH Server
Note that the SSH server is enabled by default and may be disabled via the System
folder, Bootup And Shutdown menu. When enabled, any configuration changes may
be made to take effect by selecting the Apply Changes button.
RuggedCom 237