Specifications
4-50
Cisco Internet Streamer CDS 2.0-2.3 Software Configuration Guide
OL-13493-04
Chapter 4 Configuring Devices
Configuring the Service Engine
Step 2 Enter the settings as appropriate. See Table 4-23 for a description of the fields.
Step 3 Click Submit to save the settings.
Configuring SSH
Secure Shell (SSH) consists of a server and a client program. Like Telnet, you can use the client program
to remotely log in to a machine that is running the SSH server. However, unlike Telnet, messages
transported between the client and the server are encrypted. The functionality of SSH includes user
authentication, message encryption, and message authentication.
The SSH page allows you to specify the key length and login grace time.
To enable the SSH daemon, follow these steps:
Step 1 Choose Devices > Devices > General Settings > Login Access Control > SSH. The SSH page is
displayed.
Step 2 Check Enable to enable the SSH feature. SSH enables login access to the SE through a secure and
encrypted channel.
Step 3 In the Length of Key field, specify the number of bits needed to create an SSH key. The default is 2048.
Step 4 In the Login Grace Time field, specify the number of seconds the server waits for the user to
successfully log in before it ends the connection. The authentication procedure must be completed within
this time limit. The default is 300 seconds.
Table 4-23 Login Authentication Fields
Field Description
Enable Failover Server
Unreachable
If Enable Failover Server Unreachable is enabled, the device fails over to
the secondary server only if the primary server is unreachable. In any other
case, for example, the authentication fails in the RADIUS server, the local
database is not contacted for authentication. Conversely, if the Enable
Failover Server Unreachable option is disabled, the device contacts the
secondary server, regardless of the reason the authentication failed with the
primary server.
Authentication Login
Servers
When enabled, authentication login servers are used to authenticate user
logins.
Primary Login Server Choose either local or RADIUS.
Secondary Login
Server
Choose either local or RADIUS.
Authentication Config
Server
When enabled, authentication configuration servers are used to authenticate
user privileges.
Primary Config Server Choose either local or RADIUS.
Secondary Config
Server
Choose either local or RADIUS.