Note: Only SSH2 is supported due to vulnerabilities in the SSH1 protocol.
The SSH tools supported by SecureSync are:
SSH: Secure Shell
SCP: Secure Copy
SFTP: Secure File Transfer Protocol
SecureSync implements the server components of SSH, SCP, and SFTP.
For more information on OpenSSH, please refer to www.openssh.org.
To configure SSH:
1.
Navigate to MANAGEMENT > NETWORK: SSH Setup. The SSH Setup window
will display.
The window contains two tabs:
Host Keys: SSH uses Host Keys to uniquely identify each SSH server. Host
keys are used for server authentication and identification.
Public Key: This is a text field interface that allows the user to edit the public
key files authorized_keys file.
Note: Should you exit the SSH Setup window (by clicking X in the top
right corner of the window, or by clicking anywhere outside of the
window), while filling out the Certificate Request Parameters form
before clicking Submit , any information you entered will be lost.
When switching between tabs within the SSH Setup window, how-
ever, the information you have entered will be retained.
Host Keys
You may choose to delete individual RSA or DSA host keys. Should you decide to delete
the RSA or DSA key, the SSH will function, but that form of server authentication will not
be available. Should you delete both the RSA and DSA keys, SSH will not function. In addi-
tion, if SSH host keys are being generated at the time of deletion, the key generation pro-
cesses are stopped, any keys created will be deleted, and all key bit sizes are set to 0.
You may choose to delete existing keys and request the creation of new keys, but it is
often simpler to make these requests separately.
You can create individual RSA and DSA Host Public/Private Key pairs. Host keys must first
be deleted before new Host Keys can be created.
2.14 Configure Network Settings
CHAPTER 2 • SecureSync 2400 User Manual Rev. 2
77