Siemens 5935, 5930 manual Secure Shell, Key Generator

Page 66

SIEMENS 5930/5935 Business Gateway

Chapter 6 Security Setup

User’s Guide

Secure Shell

 

 

Secure Shell

Secure Shell (SSH) secures network services over an insecure network such as the public Internet. The objective of SSH is to make a secure functional equivalent for telnet. Telnet connections and commands are vulnerable to a variety of different kinds of attacks, allowing unauthorized system access, and even allowing interception and logging of traffic to and from the system including passwords. SSH also provides secure FTP type file transfers.

To access the Secure Shell configuration pages, click Secure Shell from the left navigation pane on the Router Information page. This displays the Secure Shell (SSH) Configuration List page.

This page displays the current SSH configuration settings as well as provides links to the other SSH configuration pages.

Configure SSH

Configure SSH.

Load Keys

Load public and private SSH keys used to authenticate the

 

SSH server from a source file.

Key Generator

Generate public and private SSH keys.

Key Generator Status

Check the status of the key generation process.

SIEMENS

60

Image 66
Contents 5930/5935 Software License and Limited Warranty Software LicenseGeneral Provisions Table of Contents User Setup InstallationEasy Setup Advanced SetupSecurity Setup Monitoring RouterFront Panel for Back Panel forHardware Specifications for Software Specifications for PPP RFC SecurityFront Panel for Hardware Specifications for Software Specifications for IP Address Translation Installation Requirements Package ContentsPC Requirements Network Service Provider Requirements Hardware Installation PC Configuration Windows 98/MEWindows NT Select TCP/IP Protocol from the Network Protocols listWindows Windows XP Mac OS Mac OSX Linux Configuring the Router Establish ConnectionRouter Information To do this Refer toAccess Easy Setup Wizard Select ProtocolNAT Enabled Bridging EnabledIP Routing Enabled Block Net Bios TrafficPoint-to-Point Protocol over Ethernet over PPPoA Point-to-Point Protocol over Ethernet over RFC1483 RFC RFC 1483 MAC Encapsulated Routing MER Dynamic Host Configuration Protocol Local Area Network Configuration User Setup User ManagementAdding/Modifying a User Account Deleting a User Account Radius User LookupLocal NoneSecure Mode Configuration TrustedUntrusted Configure the Radius Server Configure the TacPlus Server Management Classes Class Functional AreasChange Password Click Save and Reboot Access ControlNo access restrictions Telnet WebAdvanced Setup Router Clock Dhcp QoS Configure QoS Policy Siemens Reorder QoS Policies To the endBefore policy Routing Table Configuration Dial Backup Click Enable Dial BackupInternal Modem External Modem Switch Management Switch Mirror Configuration Switch Age Time ATM Traffic Shaping Non Real-Time Variable Bit Rate Constant Bit RateReal-Time Variable Bit Rate Unspecified Bit RateCommand Line Interface Security Setup NAT Disable DefaultPort Number Snmp IP Filter Snmp PasswordEnter the New Password and New Password again Click Add IP RangeSecure Shell Key GeneratorConfigure SSH Load Keys Key Generator Firewall Scripts Stateful Firewall Firewall RulesConfigure Stateful Firewall View Dropped Packets Configure Firewall Rules Protocol/Port ApplicationDelete Firewall Rules IKE/IPSec Configuration Easy IKE/IPSec Setup Advanced IKE/IPSec Setup IKE PeersIKE Peers Definition IKE Proposals Definition IKE IPSec Proposals Definition Siemens IKE IPSec Policies Definition Siemens VPN Log On Monitoring Router System SummaryEthernet Interface Information Remote Connection InformationIP Routing Information System InformationDiagnostics PPPoE SessionInterface Information ATM StatisticsRouting Table Information Files InformationList All Configuration Data Memory UsageTCP/IP Statistics