Technicolor - Thomson SpeedTouchTM620 Network Router User Manual


 
Chapter 8
SpeedTouch™ Remote Access
E-DOC-CTC-20051017-0155 v1.0
91
8.4 Remote SSH Access
SSH service
Introduction
SSH (Secure Shell) is to be used to establish privacy between 2 network devices. It
provides a secured layer on top of TCP/IP.
The implementation of SSH in the SpeedTouch™ is mainly targeted to allow privacy
for CLI sessions when remotely managing the SpeedTouch™ from a WAN interface.
SSH authentication The SpeedTouch™ supports the following authentication methods:
password Password Authentication
publickey Public Key Based Authentication
The user can configure the authentication to be used during SSH session setup, this
can be done by executing the following CLI command:
By choosing 'password', authentication is based on username / password.
By choosing 'public_key', authentication is based on public key, searching in the
database of installed public keys on the SpeedTouch™.
Enabling the Secure
Shell
The Secure Shell service can be enabled by executing the following CLI command:
=>:ssh config auth=password
=>:ssh config shell=enabled