SSH

SSH

Overview

The IOLAN contains SSH Server software that you need to configure if the IOLAN is going to be accessed via SSH. If you specify more than one Authentication method and/or Cipher, the IOLAN will negotiate with the client and use the first authentication method and cipher that is compatible with both systems.

Functionality

When you are using the SSH connection protocol, keys need to be distributed to all users and the IOLAN. Below are a couple of example scenarios for key/certificate distribution.

Users Logging into the IOLAN Using SSH

This scenario applies to serial ports configured for Console Management using the SSH protocol. In the following example, users are connecting to the IOLAN via SSH from the LAN. Therefore, the following keys need to be exchanged:

zUpload the IOLAN SSH Public Key to each user’s host machine who is connecting and logging into the IOLAN using SSH.

zDownload the SSH Public Key from each user’s host machine who is connecting and logging into the IOLAN using SSH.

 

 

 

 

 

 

Network

SSH

 

 

 

 

 

perle

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Device Server

 

 

 

Server

Device Server Private Key

 

 

 

Lynn Public Key

 

 

 

 

 

 

 

 

Tracy Public Key

 

 

 

 

 

 

 

 

Dennis Public Key

 

 

 

Lynn

Device Server Public Key

Lynn Private Key

Tracy

Device Server Public Key

Tracy Private Key

Dennis

Device Server Public Key

Dennis Private Key

223

Page 223
Image 223
Perle Systems 5500161-40 manual Users Logging into the Iolan Using SSH, Device Server, Lynn, Tracy, Dennis