Tripp Lite B092-016 Owner's Manual Page 200

  • Download
  • Add to my manuals
  • Print
  • Page
    / 242
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 199
200
Cre
ate a new file "
authorized_keys
" (with notepad) and copy your public
key data from
the "Public key for pasting into OpenSS
H
authorized_keys file" section of the PuTTY Key
Generator, and paste the key data to the "authorized_keys" file. Make sure there is
onl
y
one line of text in this file
Use WinSCP to copy this
"authorized_keys" file into the users home directory: eg.
/etc/config/users/testuser/.ssh/authorized_keys
of the
Console Server
which will be the
SSH server. You will need to make sure this file
is in the correct format with the correct
permissions with the following commands:
# dos2uni
x
\
/etc/config/users/testuser/.ssh/authorized_keys && chown testuser
\
/etc/config/users/testuser/.ssh/authorized_keys
Using WinSCP copy the attached sshd_con
fig over
/etc/config/sshd_config
on the server
(Makes sure public key authentication is enabled)
Test the Public Key by logging in as "testuser"
.
Test the Public Key by logging in as
"testuser" to the client device and typing (you should not need to enter
anything): # ssh
-
o StrictHostKeyChecking=no <server
-
ip>
To automate connection of the SSH tunnel from the client on every power
-
up
,
you need to
make the clients /etc/config/rc.local look like the following:
#!/bin/sh
ssh
-
L9001:127.0.0.1:4001
-
N
-
o Stri
ctHostKeyChecking=no testuser@<server
-
ip> &
This will run the tunnel redirecting local port 9001 to the server port 4001.
15.6.6
Fingerprinting
Fingerprints
are used to ensure you are establishing an SSH session to who you think you are
.
On the firs
t connection to a remote server
,
you will receive a fingerprint which you can use on
future connections.
This fingerprint is related to the host key of the remote server. Fingerprints are stored in
~/.ssh/known_hosts
.
To receive the fingerprint from the
remote server, log in to the client as the required user
(usually root) and establish a connection to the remote host:
# ssh remhost
Page view 199
1 2 ... 195 196 197 198 199 200 201 202 203 204 205 ... 241 242

Comments to this Manuals

No comments