Supported Platforms
Configuring SSH Access
Secure Shell, or SSH, is a network protocol that allows data to be exchanged over a secure channel between two systems. This section describes how to use JCS commands to configure SSH access to the JCS1200 platform.
Tasks to configure SSH include:
Generating the Host Key
SSH access requires a host key and a user public key.
To generate the host key:
- Use an existing username and password to connect to the
JCS management module serial port. For example:
tcsh-1:telnet bcgmm1-con
In this example, the serial port is connected to a telnet server port identified as bcgmm1-con.
- Use the env command to specify mm[1] as the configuration target. For example:
system> env —T mm[1]
- Use the sshcfg command to generate a host key.
For example:
system:mm[1]> sshcfg —hk gen
It takes about 1 minute to generate a host key.
- You can use the displaylog command to monitor
host key generation. For example:
system:mm[1]> displaylog —f
- Once the host key is generated, use the sshcfg command to enable SSH for the JCS CLI. For example:
system:mm[1]> sshcfg —cstatus enabled
Adding the User Public Key
To generate a user public key:
- See the “Generating the Host Key” section to generate a host key.
- Locate the /.ssh/authorized_keys file and copy your public key from this file.
- Use the users command to add your public key.
You copy the public key from the authorized_keys file and paste it on the command line. For example:
system:mm[1]> users —2 —pk —1 —add paste-key-here
- Issue
the users command to verify that the public key has been
installed. For example:
system:mm[1]> users —2
- n chang - a Role:supervisor ... Number of SSH public keys installed for this user: 1 Last login: 1/28/08 09:26:59
- Log out, and then use SSH to log back in. For example:
system:mm[1]> exit
tcsh-1 ssh bcgmm1
In this example, the JCS management module Ethernet port is identified as bcgmm1.