
Other Security Features
32
7705 SAR OS System Management Guide
Other Security Features
Secure Shell (SSH)
Secure Shell Version 1 (SSH1) is a protocol that provides a secure, encrypted Telnet-like
connection to a router. A connection is always initiated by the client (the user).
Authentication takes place by one of the configured authentication methods (local, RADIUS,
or ). With authentication and encryption, SSH allows for a secure connection over
an insecure network.
The 7705 SAR allows you to configure SSH1 or Secure Shell Version 2 (SSH2). SSH1 and
SSH2 are different protocols and encrypt at different parts of the packets. SSH1 uses the
server as well as host keys to authenticate systems, whereas SSH2 only uses host keys. SSH2
does not use the same networking implementation that SSH1 does and is considered a more
secure, efficient, and portable version of SSH. Rather than validating identities via
passwords, SSH2 can also use public key encryption to authenticate remote hosts. For
example, if you were to connect to a remote host also running SSH2, the secure shell would
use this system to verify that the remote system is the host and not a computer set up to imitate
it.
SSH runs on top of a transport layer (like TCP or IP), and provides authentication and
encryption capabilities. SSH supports remote login to another computer over a network,
remote command execution, and file relocation from one host to another.
The 7705 SAR has a global SSH server process to support inbound SSH and SCP sessions
initiated by external SSH or SCP client applications. The SSH server supports SSH1. Note
that this server process is separate from the SSH and SCP client commands on the 7705 SAR,
which initiate outbound SSH and SCP sessions.
Inbound SSH sessions are counted as inbound Telnet sessions for the purposes of the
maximum number of inbound sessions specified by Login Control. Inbound SCP sessions are
counted as inbound FTP sessions by Login Control.
When the SSH server is enabled, an SSH security key is generated. The key is only valid until
either the node is restarted or the SSH server is stopped and restarted. The key size is
non-configurable and set at 1024 bits. When the server is enabled, both inbound SSH and
SCP sessions will be accepted provided the session is properly authenticated.
When the global SSH server process is disabled, no inbound SSH or SCP sessions will be
accepted.
Summary of Contents for 7705 SAR
Page 10: ...List of Figures 10 7705 SAR OS System Management Guide...
Page 14: ...About This Guide 14 7705 SAR OS System Management Guide...
Page 64: ...Security Configuration Procedures 64 7705 SAR OS System Management Guide...
Page 168: ...Configuration Notes 168 7705 SAR OS System Management Guide...
Page 354: ...Standards and Protocol Support 354 7705 SAR OS System Management Guide...
Page 356: ...2015 Alcatel Lucent All rights reserved 3HE 09688 AAAA TQZZA Edition 01...