Configuration and management
140
4.4
Configuration using different tools
BAT54-Rail/F..
Release
7.54
06/08
The configuration is carried out with the same commands as used under Tel-
net or other terminal program (’Command line reference’ → page 134).
4.4.7 SSH authentication
The SSH protocol generally allows two different authentication mechanisms:
D With user name and password
D With the help of a public key
In the public key method, a key pair is used that is made up of a private and
public key – a digital certificate. Detailed information about the keys men-
tioned here can be found under the section 'Digital certificates' in the chapter
on VPN in the user manual configuration. The private part of the key pair is
saved on the client (frequently protected with a password), the public part is
loaded into the BAT Router.
The BAT Router supports both RSA and DSS/DSA keys. RSA keys are
somewhat smaller, thereby allowing somewhat faster operation.
U Generating key pairs
The pairs consisting of public and private keys can be generated with the
help of OpenSource software OpenSSH, for example. The following com-
mand from a Linux operating system creates a key pair from the public part
'
id_rsa.pub
' and the private part '
id_rsa
':
ssh-keygen -t rsa