You Are Here:

SSH

The SSH, or Secure Shell, protocol is a cryptographic network protocol, allowing secure remote login by establishing a secure channel between an SSH client and an SSH server. SSH can also be used to run CLI commands.

SSH uses host keys to uniquely identify each SSH server. Host keys are used for server authentication and identification. A secure unit permits users to create or delete RSA or DSA keys for the SSH2 protocol.

Note: Only SSH2 is supported due to vulnerabilities in the SSH1 protocol.

The SSH tools supported by SecureSync are:

  • SSH: Secure Shell
  • SCP: Secure Copy
  • SFTP: Secure File Transfer Protocol

SecureSync implements the server components of SSH, SCP, and SFTP.

For more information on OpenSSH, please refer to www.openssh.org.

To configure SSH:

  1. Navigate to MANAGEMENT > NETWORK: SSH Setup. The SSH Setup window will display.
  2. The window contains two tabs:

    • Host Keys: SSH uses Host Keys to uniquely identify each SSH server. Host keys are used for server authentication and identification.
    • Public Key: This is a text field interface that allows the user to edit the public key files authorized_keys file.

    Note: Should you exit the SSH Setup window (by clicking X in the top right corner of the window, or by clicking anywhere outside of the window), while filling out the Certificate Request Parameters form before clicking Submit, any information you entered will be lost. When switching between tabs within the SSH Setup window, however, the information you have entered will be retained.