Understanding management access – Juniper Networks SRX 210 User Manual
Page 104
Understanding Management Access
Telnet allows you to connect to the services gateway and access the CLI to execute
commands from a remote system. The Telnet CLI connections are not encrypted and
therefore can be intercepted.
NOTE:
Telnet access to the root user is prohibited. You must use more secure
methods, such as SSH, to log in as
root
.
SSH provides the following features:
•
Allows you to connect to the device and access the CLI to execute commands from a
remote system
•
Encrypts traffic so that it cannot be intercepted (unlike Telnet)
•
Can be configured so that connections are authenticated by a digital certificate
•
Uses public–private key technology for both connection and authentication
The SSH client software must be installed on the machine where the client application
runs. If the SSH private key is encrypted (for greater security), the SSH client must be
able to access the passphrase used to decrypt the key.
For information about obtaining SSH software, see
and
.
If you are using a Junos XML protocol server to configure and monitor devices, you can
activate cleartext access on the device to allow unencrypted text to be sent directly over
a Transmission Line Protocol (TCP) connection without using any additional protocol
(such as SSH, SSL, or Telnet). For more information about the Junos XML management
protocol, see
.
NOTE:
Information sent in cleartext is not encrypted and therefore can be
intercepted.
If the device is operating in a Common Criteria environment, see the
.
Related
Documentation
Connecting an SRX210 Services Gateway to the CLI Locally on page 79
•
•
Connecting an SRX210 Services Gateway to the CLI Remotely on page 80
•
Performing Initial Software Configuration on the SRX210 Services Gateway Using the
CLI on page 89
•
SRX210 Services Gateway Secure Web Access Overview on page 95
Copyright © 2013, Juniper Networks, Inc.
88
SRX210 Services Gateway Hardware Guide