
8
13.Click Apply.
14.(Optional) In the Configure Service Details field, click the choices and enter appropriate values in the text boxes.
Field Name | Default Value |
Allow remote connections to forward ports | No |
Ignore user’s own known_hosts file | No |
Ignore .rhosts and .shosts files | Yes |
Time (seconds) before regenerating server key | 3600 seconds |
Login grace time (sec) | 600 seconds |
Max unauthenticated connections | 10 |
|
|
15.Click Apply.
16.(Optional) In the Configure Server Implementation Details table, select the appropriate setting from the
The default setting in the Message logging level field is INFO, and the default setting in the Strict checking of file modes field is Yes.
17.Click Apply.
18.Click Save to make your changes permanent.
Configuring Secure Shell Authorized Keys
The Secure Shell (SSH) Authorized Keys feature lets you create clients that can access accounts on your system without using a password.
To configure an authorized key, you need to have information about the clients’ keys. For SSHv1 implementation, you need to enter the RSA key and such information as key size, exponent, and modulus. One commonly used file name on your SSH client that is used for storing this information is identity.pub. For SSHv2 implementations, you need to enter the RSA/DSA key. One commonly used file name on your SSH client that is used for storing this information is id_dsa.pub. For more information, consult your SSH client software documentation.
308 | Nokia Network Voyager for IPSO 4.0 Reference Guide |