SIEMENS se5880 Ethernet Security Router | Chapter 6 Security Setup |
User’s Guide | Secure Shell |
|
|
Secure Shell
Secure Shell (SSH) secures network services over an insecure network such as the public Internet. The objective of SSH is to make a secure functional equivalent for telnet. Telnet connections and commands are vulnerable to a variety of different kinds of attacks, allowing unauthorized system access, and even allowing interception and logging of traffic to and from the system including passwords. SSH also provides secure FTP type file transfers.
To access the Secure Shell configuration pages, click Secure Shell from the left navigation pane on the Router Information page. This displays the Secure Shell (SSH) Configuration List page.
This page displays the current SSH configuration settings as well as provides links to the other SSH configuration pages.
Configure SSH | Configure SSH. |
Load Keys | Load public and private SSH keys used to authenticate the |
| SSH server from a source file. |
Key Generator | Generate public and private SSH keys. |
Key Generator Status | Check the status of the key generation process. |
SIEMENS | 52 |