Lantronix SGX 5150 User Guide - Page 100

SSH Server: Authorized Users, SSH Client: Known Hosts, Table 9-32, SSH Server Host Keys

Page 100 highlights

9: Administration SSH Settings Private Key Public Key Key Type Bit Size Table 9-32 SSH Server Host Keys Description Enter the path and name of the existing private key you want to upload. In Web Manager, you can also browse to the private key to be uploaded. Be sure the private key will not be compromised in transit. This implies the data is uploaded over some kind of secure private network. Enter the path and name of the existing public key you want to upload. In Web Manager, you can also browse to the public key to be uploaded. Select a key type to use for the new key:  RSA  DSA Select a bit length for the new key:  512  768  1024  2048  4096 Note: SSH Keys from other programs may be converted to the required SGX 5150 format. Use Open SSH to perform the conversion. SSH Server: Authorized Users The SSH Server Authorized Users are used by all applications that play the role of an SSH Server and specifically Tunneling in Accept Mode. Every user account must have a Password. The user's Public Keys are optional and only necessary if public key authentication is wanted. Using public key authentication will allow a connection to be made without the password being asked at that time. Note: When uploading the security keys, ensure the keys are not compromised in transit. SSH Settings Username Password Public RSA Key Public DSA Key Table 9-33 SSH Server Authorized Users Description Enter a new username or edit an existing one. Enter a new password or edit an existing one. Click the Browse... button to browse to the existing public RSA key you want to use with this user. In Web Manager, you can also browse to the public RSA key to be uploaded. If authentication is successful with the key, no password is required. Click the Browse... button to browse to the existing public DSA key you want to use with this user. In Web Manager, you can also browse to the public DSA key to be uploaded.If authentication is successful with the key, no password is required. SSH Client: Known Hosts The SSH Client Known Hosts are used by all applications that play the role of an SSH Client. Specifically in Connect Mode. Configuring these public keys are optional but if they exist another layer of security is offered which helps prevent Man-in-the-Middle (MITM) attacks. SGX 5150 IoT Device Gateway User Guide 100

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129

9: Administration
SGX 5150 IoT Device Gateway User Guide
100
Table 9-32
SSH Server Host Keys
Note:
SSH Keys from other programs may be converted to the required SGX 5150
format. Use Open SSH to perform the conversion.
SSH Server: Authorized Users
The SSH Server Authorized Users are used by all applications that play the role of an SSH Server
and specifically Tunneling in Accept Mode. Every user account must have a Password.
The user's Public Keys are optional and only necessary if public key authentication is wanted.
Using public key authentication will allow a connection to be made without the password being
asked at that time.
Note:
When uploading the security keys, ensure the keys are not compromised in
transit.
Table 9-33
SSH Server Authorized Users
SSH Client: Known Hosts
The SSH Client Known Hosts are used by all applications that play the role of an SSH Client.
Specifically in Connect Mode. Configuring these public keys are optional but if they exist another
layer of security is offered which helps prevent Man-in-the-Middle (MITM) attacks.
SSH Settings
Description
Private Key
Enter the path and name of the existing private key you want to upload. In Web
Manager, you can also browse to the private key to be uploaded. Be sure the
private key will not be compromised in transit. This implies the data is uploaded
over some kind of secure private network.
Public Key
Enter the path and name of the existing public key you want to upload. In Web
Manager, you can also browse to the public key to be uploaded.
Key Type
Select a key type to use for the new key:
RSA
DSA
Bit Size
Select a bit length for the new key:
512
768
1024
2048
4096
SSH Settings
Description
Username
Enter a new username or edit an existing one.
Password
Enter a new password or edit an existing one.
Public RSA Key
Click the
Browse...
button to browse to the existing public RSA key you want to use
with this user. In Web Manager, you can also browse to the public RSA key to be
uploaded. If authentication is successful with the key, no password is required.
Public DSA Key
Click the
Browse...
button to browse to the existing public DSA key you want to use
with this user. In Web Manager, you can also browse to the public DSA key to be
uploaded.If authentication is successful with the key, no password is required.