SCS100/200/400 User Guide
6: Application Setup
In conjunction with the
Set/Define SSH Mode
command, you can use the following
parameters:
SSH Parameters
Effect
Parameter
Incoming (host to SCS)
Outbound (SCS to host)
V1ONLY
SCS offers only SSHv1 connections
SCS only connects using SSHv1
V2ONLY
SCS offers only SSHv2 connections
SCS only connects using SSHv2
V1PREFER
SCS offers both v1 and v2 and the client
chooses
If both SSHv1 and SSHv2 are available,
chooses SSHv1
V2PREFER
(default)
SCS offers both v1 and v2 and the client
chooses
If both SSHv1 and SSHv2 are available,
chooses SSHv2
If a compatible protocol version is not agreed upon (one node wants SSHv1 and the
other wants SSHv2), the connection does not occur.
Creating an AUTHORIZED_KEYS File
RSA and DSA are commonly used Internet encryption and authentication systems
included as part of the web browsers from Netscape and Microsoft. To use RSA and DSA
user authentication for connections to the SCS, you must create an
AUTHORIZED_KEYS
file and store it in the
/flash/ssh/
directory of the SCS.
The
AUTHORIZED_KEYS
file consists of each user’s public key. For example, on a
UNIX host, your public key is stored in a file called
.ssh/identity.pub
. The SSH client’s
key generation software creates both an unreadable private key file (often called
identity
) and a human readable public key file (
identity.pub
).
Note:
Not all clients come with this program. If yours does not, you may need to
use the Username/Password Authentication method described below.
Once you have created a public key file:
1.
Copy the contents of the public key file (
identity.pub
) to a text file.
2.
Save the file with the name
AUTHORIZED_KEYS
. (
AUTHORIZED_KEYS
file names
are case sensitive.)
Note:
Make sure there is no file extension. In Windows, you may need to save
the file as a .txt file and then rename the file to remove the extension.
Shared Key Authentication Process
RSA, DSA, and/or username/password authentication can be used to ensure only
authorized users access the SCS and connected equipment. The following sections
explain how to configure each of these.
Briefly, here’s how public/private key authentication works on the SCS. We assume that
the user’s public/private key pair has been generated. In this example, RSA user
authentication is used. DSA authentication is similar.
1.
The SSH client on the user’s computer sends the public half of the user’s identity key
to the SCS.
6-16