Specifications
sion 2 of SSH, the files id-dss.pub and id-rsa.pub are involved.
Select them and the key appears in the list (see Figure 3.51).
Figure 3.51: Import Key
Enter a key by copying and pasting. If you click ‘Add Key’, a dialog
opens. In the text field, enter your “ssh-public-key” and confirm with
‘Ok’. The scheme now appears in the lower list.
With ‘Delete Key’, remove a selected key.
Allow password authentication in emergencies by activating the corre-
sponding check box. We strongly advise only allowing access via RSA
keys.
On the second dialog page, assign access rights for SSH. Have the “listen-to”
parameters automatically calculated by activating this check box or select the
desired IP addresses yourself.
If required, activate the automatic generation of IP filter rules and the logging
of access violations. At the end of the input mask, select the IP addresses
from which SSH access should be enabled.
98 Using the FAS










