beautypg.com

4 remote ssh access, Ssh service introduction, Ssh authentication – Technicolor - Thomson Wireless Business DSL Routers SpeedTouchTM620 User Manual

Page 101: Enabling the secure shell, Remote ssh access, Chapter 8

background image

Chapter 8

SpeedTouch™ Remote Access

E-DOC-CTC-20051017-0155 v1.0

91

8.4 Remote SSH Access

SSH service

Introduction

SSH (Secure Shell) is to be used to establish privacy between 2 network devices. It
provides a secured layer on top of TCP/IP.
The implementation of SSH in the SpeedTouch™ is mainly targeted to allow privacy
for CLI sessions when remotely managing the SpeedTouch™ from a WAN interface.

SSH authentication

The SpeedTouch™ supports the following authentication methods:

password

Password Authentication

publickey

Public Key Based Authentication

The user can configure the authentication to be used during SSH session setup, this
can be done by executing the following CLI command:

By choosing 'password', authentication is based on username / password.
By choosing 'public_key', authentication is based on public key, searching in the
database of installed public keys on the SpeedTouch™.

Enabling the Secure

Shell

The Secure Shell service can be enabled by executing the following CLI command:

=>:ssh config auth=password

=>:ssh config shell=enabled