C-M-G
Series
Manual
© TDT GmbH
Chapter 5: Network Configuration
Seite 82 von 136
5.16 SSH Server
SSH is a protocol enabling users to call a router, similar a Telnet. However, all SSH connections are
encypted and certified thereby avoiding passwords or transmitted data being seen by hackers.
5.16.1 Authentication
All settings related to SSH securty and also login information beeing displayed can be configured here.
Command
Description
Allow authentication by
password?
Yes (Default):
User can logon to a router using a password
No:
User can only logon with a public key
Allow login by root?
Yes (Default):
User can logon under root
No:
User cannot logon under root
Only with RSA auth:
User can logon under root when an RSA
authentication has been carried out
Only for commands:
User can logon under root to enter
commands
Check permissions on key
files?
Yes (Default):
A user’s authorisation will be assigned dependant
on the deposited keys
No:
A user’s authorisation will be assigned dependant on the user
name
Ignore users' known_hosts
files?
Yes:
The SSH daemon ignores the $HOME/.ssh/known_hosts
files during an RSA authentication
No:
THE SSH processes ignores the $HOME/.ssh/known_hosts
file during an RSA authentication
Pre-login message file
None (Default):
No message will output before login.
String:
The text message will output in the specified file before
login.
User authorized keys file
Default (~/.ssh/authorized_keys):
The authentication keys are
located in the default directory
String:
The authentication keys are located in the declared
directory
Permit logins with empty
passwords?
Yes:
Login with an empty password is permissible
No (Default):
Login will require a password
Allow RSA authentication?
Yes (Default):
Login with RSA authentication is permissible
No:
Login with RSA authentication is not permissible
Display /etc/motd at login?
Yes (Default):
The text message stored unter /etc/motd will be
output after login
No:
No message will be output
Allow login just by
hosts.equiv
and .rhosts?
Yes:
The files hosts.equiv and .rhosts will be used for
authentication (security risk)
No (Default):
The files hosts.equiv and .rhosts will not be used for
authentication
Ignore .rhosts files?
Yes (Default):
The .rhosts file will be ignored during dial-up
No:
The .rhosts file will not be ignored during dial-up
Check hosts.equiv and
.rhosts
for RSA authentication?
Yes (Default):
The files hosts.equiv and .rhosts will be used for
RSA authentication
No:
The files hosts.equiv and .rhosts will not be used for RSA
authentication