User's Manual

SSH Server Configuration
Secure Shell (SSH) is UNIX-based command interface and network protocol used to gain secure access to a remote computer,
execute commands on a remote machine or to transfer files between machines. It was designed as a replacement for Telnet
and other insecure remote shell protocols which send information, including passwords, as plain text.
SSH uses RSA public key cryptography for both connection and authentication. There are several ways of using SSH:
Use automatically generated public-private key pairs to encrypt the network connection and then use password
authentication to log on.
Use a manually generated public-private key pair to perform the authentication and allow users or programs to log
in without using a password.
Figure 70 - SSH Server Configuration
To configure SSH:
1. Select the types of authentication you want to use by clicking the Enable password authentication and Enable key
authentication toggle keys on or off.
2. Click the Save button.
3.
66
NetComm Wireless CDMA M2M Router
www.netcommwireless.com