Home > |
---|
Set the SSH device restriction policy.
This command restricts appliance/HSM administrative traffic (over SSH) to only the indicated Ethernet port. Use this where you need to segregate administrative traffic from client (NTLS) traffic. This command is an alternative to the command sysconf ssh ip, which performs the same action by specifying an IP address that corresponds to one of your network devices.
If you wish, SSH traffic restriction could complement client traffic restriction using the command ntls bind, which binds client (NTLS) traffic to a specific IP or device name on your SafeNet Network HSM.
sysconf ssh device <netdevice>
Parameter | Shortcut | Description |
---|---|---|
<netdevice> |
Specifies the device to which you want to restrict the SSH service. Valid values: all: Allow SSH on all devices. eth0: Restrict SSH connections to the eth0 interface. eth1: Restrict SSH connections to the eth1 interface. lo: Default: |
lunash:>sysconf ssh device all
WARNING: SSH is already restricted to the specified IP address / ethernet card. No changes made.
Command Result : 0 (Success)
[myluna] lunash:>sysconf ssh device eth1
Success: SSH now restricted to ethernet device eth1 (ip address 192.168.255.2).
Restarting ssh service.
Stopping sshd: [ OK ]
Starting sshd: [ OK ]
Command Result : 0 (Success)
[myluna] lunash:>sysconf ssh show
SSHD configuration:
SSHD Listen Port: 22 (Default)
SSH is restricted to ethernet device eth1 (ip address 192.168.255.2).
Password authentication is enabled
Public key authentication is enabled
Command Result : 0 (Success)