EasyManuals Logo
Home>Lantronix>Server>SCS100

Lantronix SCS100 User Manual

Lantronix SCS100
62 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #46 background imageLoading...
Page #46 background image
SCS100/200/400 User Guide 6: Application Setup
In conjunction with the Set/Define SSH Mode command, you can use the following
parameters:
SSH Parameters
Effect
Parameter
Incoming (host to SCS)
Outbound (SCS to host)
V1ONLY SCS offers only SSHv1 connections
SCS only connects using SSHv1
V2ONLY SCS offers only SSHv2 connections
SCS only connects using SSHv2
V1PREFER
SCS offers both v1 and v2 and the client
chooses
If both SSHv1 and SSHv2 are available,
chooses SSHv1
V2PREFER
(default)
SCS offers both v1 and v2 and the client
chooses
If both SSHv1 and SSHv2 are available,
chooses SSHv2
If a compatible protocol version is not agreed upon (one node wants SSHv1 and the
other wants SSHv2), the connection does not occur.
Creating an AUTHORIZED_KEYS File
RSA and DSA are commonly used Internet encryption and authentication systems
included as part of the web browsers from Netscape and Microsoft. To use RSA and DSA
user authentication for connections to the SCS, you must create an
AUTHORIZED_KEYS file and store it in the /flash/ssh/ directory of the SCS.
The AUTHORIZED_KEYS file consists of each user’s public key. For example, on a
UNIX host, your public key is stored in a file called .ssh/identity.pub. The SSH client’s
key generation software creates both an unreadable private key file (often called
identity) and a human readable public key file (identity.pub).
Note: Not all clients come with this program. If yours does not, you may need to
use the Username/Password Authentication method described below.
Once you have created a public key file:
1. Copy the contents of the public key file (identity.pub) to a text file.
2. Save the file with the name AUTHORIZED_KEYS. (AUTHORIZED_KEYS file names
are case sensitive.)
Note: Make sure there is no file extension. In Windows, you may need to save
the file as a .txt file and then rename the file to remove the extension.
Shared Key Authentication Process
RSA, DSA, and/or username/password authentication can be used to ensure only
authorized users access the SCS and connected equipment. The following sections
explain how to configure each of these.
Briefly, here’s how public/private key authentication works on the SCS. We assume that
the user’s public/private key pair has been generated. In this example, RSA user
authentication is used. DSA authentication is similar.
1. The SSH client on the user’s computer sends the public half of the user’s identity key
to the SCS.
6-16

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Lantronix SCS100 and is the answer not in the manual?

Lantronix SCS100 Specifications

General IconGeneral
BrandLantronix
ModelSCS100
CategoryServer
LanguageEnglish

Related product manuals