4 remote ssh access, Ssh service introduction, Ssh authentication – Technicolor - Thomson Wireless Business DSL Routers SpeedTouchTM620 User Manual
Page 101: Enabling the secure shell, Remote ssh access, Chapter 8
Chapter 8
SpeedTouch™ Remote Access
E-DOC-CTC-20051017-0155 v1.0
91
8.4 Remote SSH Access
SSH service
Introduction
SSH (Secure Shell) is to be used to establish privacy between 2 network devices. It
provides a secured layer on top of TCP/IP.
The implementation of SSH in the SpeedTouch™ is mainly targeted to allow privacy
for CLI sessions when remotely managing the SpeedTouch™ from a WAN interface.
SSH authentication
The SpeedTouch™ supports the following authentication methods:
password
Password Authentication
publickey
Public Key Based Authentication
The user can configure the authentication to be used during SSH session setup, this
can be done by executing the following CLI command:
By choosing 'password', authentication is based on username / password.
By choosing 'public_key', authentication is based on public key, searching in the
database of installed public keys on the SpeedTouch™.
Enabling the Secure
Shell
The Secure Shell service can be enabled by executing the following CLI command:
=>:ssh config auth=password
=>:ssh config shell=enabled