Secure shell – Siemens se5880 User Manual
Page 58
SIEMENS se5880 Ethernet Security Router
User’s Guide
Chapter 6 Security Setup
Secure Shell
SIEMENS
52
Secure Shell
Secure Shell (SSH) secures network services over an insecure network such as the public Internet. The
objective of SSH is to make a secure functional equivalent for telnet. Telnet connections and commands are
vulnerable to a variety of different kinds of attacks, allowing unauthorized system access, and even allowing
interception and logging of traffic to and from the system including passwords. SSH also provides secure FTP
type file transfers.
To access the Secure Shell configuration pages, click Secure Shell from the left navigation pane on the
Router Information page. This displays the Secure Shell (SSH) Configuration List page.
This page displays the current SSH configuration settings as well as provides links to the other SSH
configuration pages.
Configure SSH.
Load public and private SSH keys used to authenticate the
SSH server from a source file.
Generate public and private SSH keys.
Key Generator Status
Check the status of the key generation process.