18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Remote administration using Secure Shell<br />

2-18 Administrator’s Overview<br />

When configuring the SSH server you have the option to use<br />

RSA/DSA authentication. If you use RSA/DSA authentication, the<br />

authentication is accomplished via an exchange <strong>of</strong> public and private<br />

keys between the server and the client. The downside <strong>of</strong> RSA/DSA<br />

authentication is that it requires a bit more <strong>of</strong> an administrative effort.<br />

If you elect NOT to use RSA/DSA authentication, the SSH clients must<br />

enter their <strong>Sidewinder</strong> <strong>G2</strong> user name and authentication information<br />

when initiating the SSH connection.<br />

The following sub-sections provide specific information on<br />

configuring the <strong>Sidewinder</strong> <strong>G2</strong> as an SSH server using RSA or DSA<br />

authentication, as well as general information on configuring the SSH<br />

server.<br />

Configuring SSH when not using RSA/DSA authentication<br />

If you are not using RSA/DSA authentication, follow the steps below<br />

to configure SSH.<br />

1. In the Admin Console, select Services Configuration -> Servers.<br />

2. Select sshd in the list <strong>of</strong> server names, and click the Configuration tab.<br />

3. Ensure that the Allow RSA Authentication field is disabled.<br />

Rather than using RSA authentication, each client will be required to log<br />

in using their <strong>Sidewinder</strong> <strong>G2</strong> user name and authentication information.<br />

4. Click the Control tab.<br />

5. Enable the SSH server in the desired burbs, then click the Save icon.<br />

6. [Conditional] If a Host Key Pair does not exist, you will be prompted by<br />

the Admin Console to confirm that the Admin Console will create an<br />

SSH host key. Click Yes.<br />

7. Configure and enable the authentication method you want to use to<br />

authenticate SSH sessions. See Chapter 9 for information.<br />

8. Create an SSHD rule that allows SSH clients to log into this <strong>Sidewinder</strong><br />

<strong>G2</strong> using SSH.<br />

In the rule, select the following options: Service Type= server,<br />

Service = sshd. You will also need to select the authentication method<br />

you enabled in step 7. See “Creating proxy rules” on page 7-4 for<br />

information on creating a proxy rule using the Admin Console.<br />

Note: If the client has previously established an SSH connection to the <strong>Sidewinder</strong><br />

<strong>G2</strong>, the information associated with the previous connection must be deleted from<br />

the client.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!