Posts Tagged ‘SSH’

Security and Authentication Considerations for Network Power Switch Products

Friday, November 4th, 2011

A network power switch can provide network administrators and tech support personnel with an incredibly convenient tool for controlling power and reboot functions at off-site data centers and remote network equipment cabinets. In many cases, the remote reboot and power control functions provided by a network power switch can allow you to deal with power related problems with remote network elements without the expense and lost time of traveling to the network equipment site in person.

(more…)

Upgrade Security on Secure Shell with a Few Easy Steps

Monday, January 17th, 2011

Here’s some food for thought for network administrators …

Secure Shell is nearly always put in place as a secure replacement for telnet. It’s default behavior for any administrator. But the problem is, out of the box, Secure Shell isn’t as secure as it can be. There are plenty of ways to take this security measure to much higher levels, but which are the quickest to implement that will gain you the most security? Let’s dig in and find out.

(more…)

Direct Connect Capabilities for Out of Band Management Applications

Monday, December 27th, 2010

WTI Out of Band Management products include Direct Connect capabilities, that allow you to initiate a Telnet, SSH or Raw Socket session with the Out of Band Management unit and then make an immediate connection to a serial port of your choice, without first being presented with the Out of Band Management unit’s command interface. This allows you to connect to a TCP port that’s mapped directly to one of the Out of Band Management unit’s RS232 Serial Ports.

(more…)

Create an SSH Key with Seahorse

Monday, December 20th, 2010

Here’s a cool trick for Seahorse users …

Seahorse is a very powerful tool for the creation and managing of various keys. Seahorse is the default keyring manager for the GNOME desktop. I have covered Seahorse here on Ghacks before (see “Create, sign, and publish your PGP keys with Seahorse“), but one aspect I didn’t cover was the use of Seahorse for secure shell keys. As you know, you can create secure shell keys that can be used for an even more secure ssh environment. I have shown how this is done via command line (see my article “Five handy secure shell tips and tricks“), but did you know that this can be taken care of using the Seahorse GUI? Let’s take a look and see how this is done.

(more…)

How a Console Server Management Unit Can Make Your Job Easier

Wednesday, December 8th, 2010

If you need secure, reliable access to RS232 console ports on remote servers, routers, firewalls and other network elements, WTI console server management products provide an ideal solution. System administrators can reduce downtime by managing and troubleshooting devices from anywhere, without the need for on-site personnel or expensive truck rolls. WTI console server management units are available in either 100-240 VAC or -48 VDC powered versions, with RJ45 or DB9 serial ports, and in 40-port, 32-port, 24-port, 16-port or 8-port configurations.

(more…)

A Secure Server Console Switch for the Finance Industry

Friday, December 3rd, 2010

Since server console switch products are used in a variety of different applications in many different industries, it’s predictable that each industry looks for a different set of features when selecting a server console switch. Some market sectors are more concerned with port configuration parameters, others are more concerned with environmental alarms, while others are more interested in port buffering capabilities. But in the finance industry, the most important server console switch feature is always security and authentication.

(more…)