beautypg.com

Comtech EF Data SLM-5650A User Manual

Page 259

background image

SLM-5650A Satellite Modem

Revision 8

TRANSEC Module HTTPS Interface

MN-SLM5650A

10–9

Network Parameters

Item

Description

Secure Management IP

Allows users to change the IP address of the TRANSEC Module to suit their own

operational environment.

NOTE: If this text box changes, it will be necessary to repeat the process in Section

10.3, using the newly-designated IP address, to regain access to the TRANSEC Web

Interface.

Subnet Bits

Allows users to modify the IP subnet mask of the TRANSEC Module to suit their own

operational environment.

Gateway IP

Allows users to modify the default gateway of the TRANSEC Module to suit their own

operational environment.

NOTE: The IP address entered in the text box must match the subnet of the Secure

Management IP. If it does not then the Gateway IP text box will default to 0.0.0.0.

Click [Update Settings] to apply changes made to any of these parameters.

Crypto Officer Credentials

This section is used to create a TRANSEC Module Crypto Officer Username and Crypto

Officer Password. Note that are each restricted to a minimum of 7 and a maximum of 25

characters, excluding : (ASCII Code 58), < (ASCII Code 60), > (ASCII Code 62), (ASCII Code

34), and ~ (ASCII Code 126).

The default for both the Crypto Officer Username and Password is comtech.

Item

Description

Crypto Officer Username

Use this text box to create the desired username.

Password

Use this text box to create the desired password for the username being created.

Confirm Password

Use this text box to re-enter the previously entered password.

Once the Username is entered and the Password is confirmed, click [Update Credentials] to

finalize this update.

SSH (Secure Shell) Console

Item

Description

Host Key Signature

This key signature, or fingerprint, helps to identify the TRANSEC Module when

connecting through SSH. SSH clients typically show the host key signature when they

connect to a system for the first time. The user can then compare the host key the

SSH client shows with the host key the TRANSEC Module displays to verify that they

are the same.

Click [Generate New Host Key] to generate a new host key that uniquely identifies the

TRANSEC Module. After doing this, SSH clients that have connected to the TRANSEC

Module before will usually note or warn that the host key has changed when they

connect again.