User's Manual
Table Of Contents
- PremierWave XC HSPA+ User Guide
- 1: Using This Guide
- 2: Introduction
- 3: Installation of PremierWave XC HSPA+
- 4: Using DeviceInstaller
- 5: Configuration Using Web Manager
- 6: Network Settings
- Network 1 (eth0) Interface Settings
- Network 1 (Link) Settings
- Network 1 (Failover)
- Network 2 (Cellular) Settings
- Network 2 (Link) Settings
- Gateway
- 7: Cellular
- 8: Action Settings
- 9: Line and Tunnel Settings
- Line Settings
- Tunnel Settings
- Serial Settings
- To Configure Tunnel Serial Settings
- Packing Mode
- To Configure Tunnel Packing Mode Settings
- Accept Mode
- To Configure Tunnel Accept Mode Settings
- Connect Mode
- To Configure Tunnel Connect Mode Settings
- Disconnect Mode
- To Configure Tunnel Disconnect Mode Settings
- Modem Emulation
- To Configure Tunnel Modem Emulation Settings
- Relay Output
- 10: Terminal and Host Settings
- 11: Services Settings
- 12: Security Settings
- 13: Maintenance and Diagnostics Settings
- Filesystem Settings
- Protocol Stack Settings
- SMTP Settings
- Diagnostics
- Threads
- Clock
- System Settings
- Discovery and Query Port
- 14: Advanced Settings
- 15: Security in Detail
- 16: Updating Firmware
- 17: Branding the PremierWave XC HSPA+
- Appendix A: Technical Specifications
- Appendix B: Compliance
- Appendix C: Technical Support
- Appendix D: Binary to Hexadecimal Conversions
- Appendix E: USB-CDC-ACM Device Driver File for Windows Hosts
12: Security Settings
PremierWave XC HSPA+ User Guide 67
Note: SSH Keys from other programs may be converted to the required PremierWave
format. Use Open SSH to perform the conversion.
SSH Client Known Hosts
The SSH Client Known Hosts are used by all applications that play the role of an SSH Client.
Specifically in Connect Mode. Configuring these public keys are optional but if they exist another
layer of security is offered which helps prevent Man-in-the-Middle (MITM) attacks.
Table 12-2 SSH Client Known Hosts
Note: These settings are not required for communication. They protect against Man-In-
The-Middle (MITM) attacks.
SSH Server Authorized Users
The SSH Server Authorized Users are used by all applications that play the role of an SSH Server
and specifically Tunneling in Accept Mode. Every user account must have a Password.
The user's Public Keys are optional and only necessary if public key authentication is wanted.
Using public key authentication will allow a connection to be made without the password being
asked at that time.
Note: When uploading the security keys, ensure the keys are not compromised in
transit.
Public Key Enter the path and name of the existing public key you want to upload. In
WebManager, you can also browse to the public key to be uploaded.
Key Type Select a key type to use for the new key:
RSA
DSA
Bit Size Select a bit length for the new key:
512
768
1024
RSS Settings Description
Server Specify either a DNS Hostname or IP Address when adding public host keys for a
Server. This Server name should match the name used as the Remote Address in
Connect Mode Tunneling.
Public RSA Key Enter the path and name of the existing public RSA key you want to use with this
user. In WebManager, you can also browse to the public RSA key to be uploaded. If
authentication is successful with the key, no password is required.
Public DSA Key Enter the path and name of the existing public DSA key you want to use with this
user. In WebManager, you can also browse to the public DSA key to be uploaded.If
authentication is successful with the key, no password is required.
RSS Settings
(continued)
Description
PRELIMINARY DRAFT
PRELIMINARY DRAFT