Western Telematic MPC-8H-1, MPC-20VD20-2, MPC-20VD20-1, MPC-20VS20-2 SSH Encryption, K <k> Enter

Models: MPC-20VS20-1 MPC-8H-1 MPC-20VS16-3 MPC-20VD16-3 MPC-20V-1 MPC-8H-2 MPC-20VS20-2 MPC-20VD20-1 MPC-20VD20-2

1 204
Download 204 pages 27.87 Kb
Page 150
Image 150
10. SSH Encryption

10. SSH Encryption

In addition to standard Telnet protocol, the MPC also supports SSH connections, which provide secure, encrypted access via network. In order to communicate with the MPC using SSH protocol, your network node must include an appropriate SSH client.

Note that when the /K (Send SSH Key) command is invoked, the MPC can also provide you with a public SSH key, which can be used to streamline connection to the MPC when using SSH protocol.

Although you can establish an SSH connection to the unit without the public key, the public key provides validation for the MPC, and once this key is supplied to the SSH client, the client will no longer display a warning indicating that the MPC is not a recognized user when the client attempts to establish a connection.

The /K command uses the following format:

/K <k> [Enter]

Where k is an argument that determines which type of public key will be displayed, and the k argument offers the following options:

1.SSH1

2.SSH2 RSA

3.SSH2 DSA

For example, to obtain the public SSH key for an SSH2 RSA client, type /K 2 and then press [Enter].

Note: Although the MPC does not support SSH1, the /K 1 command will still return a key for SSH1.

10-1

Page 150
Image 150
Western Telematic MPC-8H-1, MPC-20VD20-2, MPC-20VD20-1, MPC-20VS20-2, MPC-20V-1 MPC-8H-2 manual SSH Encryption, K <k> Enter