Lantronix EDS3000PR User Guide - Page 64

To Con SNMP Settings, Using Web Manager, Using the CLI, Using XML, SSH, SSH Server: Host Keys

Page 64 highlights

9: Administration To Configure SNMP Settings Using Web Manager  To configure SNMP, on the Administration page, click SNMP in the menu. Using the CLI  To enter the SNMP command level: enable > config > snmp Using XML  Include in your file: SSH The SSH Server Host Keys are used by all applications that play the role of an SSH Server during Tunneling in Accept Mode. These keys can be created elsewhere and uploaded to the EDS3000 devices or automatically generated on the gateway. Configuration is required when the EDS3000 devices are either (1) the SSH server or (2) an SSH client. The SSH server is used by the CLI (Command Mode) and for tunneling in Accept Mode. The SSH client is for tunneling in Connect Mode. To configure the EDS3000 devices as an SSH server, there are two requirements:  Defined Host Keys: both private and public keys are required. These keys are used for the Diffie-Hellman key exchange (used for the underlying encryption protocol).  Defined Users: these users are permitted to connect to the EDS3000 devices SSH server. SSH Server: Host Keys The SSH Server Host Keys are used by all applications that play the role of an SSH Server during Tunneling in Accept Mode. These keys can be created elsewhere and uploaded to the device or automatically generated on the gateway. If uploading existing keys, take care to ensure the Private Key will not be compromised in transit. This implies the data is uploaded over some kind of secure private network. Note: Some SSH Clients require RSA Host Keys to be at least 1024 bits in size. SSH Settings Private Key Public Key Submit (button) Table 9-26 SSH Server Host Keys Description Click the Choose File button to navigate to the existing private key you want to upload. Be sure the private key will not be compromised in transit. This implies the data is uploaded over some kind of secure private network. Click the Choose File button to navigate to the existing public key you want to upload. Click the Submit button after changes are made in the above Upload Keys fields. EDS3000 Device Server User Guide 64

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100

9: Administration
EDS3000 Device Server User Guide
64
To Configure SNMP Settings
Using Web Manager
To configure SNMP, on the
Administration
page, click
SNMP
in the menu.
Using the CLI
To enter the SNMP command level:
enable > config > snmp
Using XML
Include in your file:
<configgroup name=”snmp”>
SSH
The SSH Server Host Keys are used by all applications that play the role of an SSH Server during
Tunneling in Accept Mode. These keys can be created elsewhere and uploaded to the EDS3000
devices or automatically generated on the gateway.
Configuration is required when the EDS3000 devices are either (1) the SSH server or (2) an SSH
client. The SSH server is used by the CLI (Command Mode) and for tunneling in Accept Mode.
The SSH client is for tunneling in Connect Mode.
To configure the EDS3000 devices as an SSH server, there are two requirements:
Defined Host Keys:
both private and public keys are required. These keys are used for the
Diffie-Hellman key exchange (used for the underlying encryption protocol).
Defined Users
: these users are permitted to connect to the EDS3000 devices SSH server.
SSH Server: Host Keys
The SSH Server Host Keys are used by all applications that play the role of an SSH Server during
Tunneling in Accept Mode. These keys can be created elsewhere and uploaded to the device or
automatically generated on the gateway.
If uploading existing keys, take care to ensure the Private Key will not be compromised in transit.
This implies the data is uploaded over some kind of secure private network.
Note:
Some SSH Clients require RSA Host Keys to be at least 1024 bits in size.
Table 9-26
SSH Server Host Keys
SSH Settings
Description
Private Key
Click the
Choose File
button to navigate to the existing private key you want to
upload. Be sure the private key will not be compromised in transit. This implies the
data is uploaded over some kind of secure private network.
Public Key
Click the
Choose File
button to navigate to the existing public key you want to
upload.
Submit (button)
Click the
Submit
button after changes are made in the above Upload Keys fields.