EasyManua.ls Logo

Gorgy Timing LEDI NETWORK TDS V1 - Page 71

Gorgy Timing LEDI NETWORK TDS V1
101 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
MDE-LEDI-NETWORK-TDS-4099V3.0
71
It is also possible to log in with a public key. This key and its private key can be generated
with the “ssh-keygen” command under Linux or Cygwin under Windows in
“$HOME/.ssh/id_rsa.pub” (public key) and “$HOME/.ssh/id_rsa” (private key). Cygwin needs
the openssh package to run “ssh-keygen”. The file containing the public key (id_rsa.pub)
must then be copied to the server via the FTP or SCP in the “.ssh” folder with the file name
(authorised_keys”. Only one 2048-bit RSA key is supported by the server.
To reduce the risk of network attacks, SSH clients store the SSH servers they have
accessed. A warning message should appear the first time a server is connected or in the
event of a computer attack involving server identity theft. The user is then given the choice
of whether or not to access the server and whether or not to let the SSH client memorise the
server.
Under Windows
To connect to a Gorgy Timing product via Telnet, run cmd.exe and enter telnet <IP>
9999” replacing <IP> with the IP address of the product.
For the SSH protocol, there is no application included in Windows. You will need to install a
client such as Putty or Teraterm. If requested by these applications, the SSH connection
settings are:
SSH version 2 (or SSH2)
Port TCP 22
Under Linux
To connect to a Gorgy Timing product using SSH, launch a terminal and enter ssh
<username>@<address> with the username and IP address of the product. The key
exchange method, authentication code and encryption algorithm can be forced
independently by inserting the following options between “sshand the username:
-oKexAlgorithms=<method>” for the key exchange method,
-m <code> for the authentication code, and
-c <algorithm> for the encryption algorithm.
When authenticating with a key, if the error Agent admitted failure to sign using key
appears, run: eval "$(ssh-agent -s)" && rm ~/.ssh/known_hosts && ssh-
add

Table of Contents