Product specifications
Efficient Networks
®
Router family
Technical Reference Guide
Chapter 8: WEB Management Interface
Efficient Networks
®
Page8-45
SSH
Secure Shell (SSH) allows secure network services over an insecure network such as
the public Internet. The objective of SSH is to make a secure functional equivalent for
telnet. Telnet connections and command are vulnerable to a variety of different kinds
of attacks, allowing unauthorized system access, and even allowing interception and
logging of traffic to and from the system including passwords. SSH also provides
secure FTP type file transfer. For more information, see “SSH” on page 5-70.
SSH is a key enabled feature and will not be displayed on the Main menu if the
feature has not been key-enabled. For additional information, see “Key Enabled
Features” on page 4-29.
Secure Shell (SSH) Configuration List Page
The SSH Configuration List page displays the current SSH configuration settings as
well as the links to the other SSH pages. The SSH list page is shown below. For
information on the information displayed, see “Secure Shell Configuration page” on
page 8-46.
SSH Navigation
From the Main Menu, select:
>SSH
>Configure SSH
>Load Keys
>Key Generator
>Key Generator Status