CLI Access: Difference between revisions
migrate>Ad-B No edit summary |
No edit summary |
||
| (4 intermediate revisions by 3 users not shown) | |||
| Line 1: | Line 1: | ||
Using this function, you can administer the system remotely with the SSH (Secure SHell) protocol. | |||
Default user is ''''cli'''' and cannot be changed - however, you can change the password. | |||
;Allow IP | ;Allow IP | ||
| Line 11: | Line 13: | ||
Passwords cannot contain: | Passwords cannot contain: | ||
Example syntax of an SSH command:<br/>'''ssh -2 -p 22223 -l | *special characters: ' " ` ^ & $ # [ ] \/ | *, | ||
*spaces. | |||
Example syntax of an SSH command:<br/>'''ssh -2 -p 22223 -l cli ip_address command''' | |||
*option: '''-2''' sets the version of the ssh protocol used for the connection, | |||
*option: '''-p''' sets the connection port, | |||
*option: '''-l''' sets the user (the user must be '''cli'''), | |||
*option: '''ip_address''' sets the address of the server you want to connect to, | |||
*option: '''command'''; use '''help''' to display all available commands. | |||
You will be asked for the password you entered in the CLI/API configuration menu. | You will be asked for the password you entered in the CLI/API configuration menu. | ||
| Line 29: | Line 31: | ||
It is also possible to authenticate without a password by using the key generated after clicking '''generate and download''', or downloading a previously generated key by clicking '''download'''.On GNU/Linux systems make sure that the key file has read only rights for the owner (400). | It is also possible to authenticate without a password by using the key generated after clicking '''generate and download''', or downloading a previously generated key by clicking '''download'''.On GNU/Linux systems make sure that the key file has read only rights for the owner (400). | ||
Example syntax of an SSH command using a key:<br/>'''ssh -i path_to_the_downloaded_key -2 -p 22223 -l | Example syntax of an SSH command using a key:<br/>'''ssh -i path_to_the_downloaded_key -2 -p 22223 -l cli ip_address command''' | ||
*option: '''-i''' sets the path to the downloaded key file, | |||
*option: '''-2''' sets the version of the SSH protocol used for the connection, | |||
*option: '''-p''' sets the connection port (default: 22223), | |||
*option: '''-l''' sets the user (the user must be '''cli'''), | |||
*option: '''ip_address''' sets the IP address of the storage server you want to connect to, | |||
*option: '''command'''; use 'help' to show all available commands. | |||
'''Note''' | |||
Every time the '''generate and download''' button is pressed, it generates a new key and the old key expires. | |||
[[Category:Help topics]] | |||
Latest revision as of 14:28, 15 March 2019
Using this function, you can administer the system remotely with the SSH (Secure SHell) protocol.
Default user is 'cli' and cannot be changed - however, you can change the password.
- Allow IP
- You can assign IP addresses (separated by a semicolon) which are granted access to server configuration. Empty field means no restriction.
- Set port
- Default port is 22223 for security reasons, because high ports are invisible to port scanners. You can change it to any port within the 1024-65535 range, except for the ports which are already used.
- Password
- Minimum password length is 5 characters. Be sure to use strong passwords.
- Confirm password
- Please retype your new password.
Passwords cannot contain:
- special characters: ' " ` ^ & $ # [ ] \/ | *,
- spaces.
Example syntax of an SSH command:
ssh -2 -p 22223 -l cli ip_address command
- option: -2 sets the version of the ssh protocol used for the connection,
- option: -p sets the connection port,
- option: -l sets the user (the user must be cli),
- option: ip_address sets the address of the server you want to connect to,
- option: command; use help to display all available commands.
You will be asked for the password you entered in the CLI/API configuration menu.
It is also possible to authenticate without a password by using the key generated after clicking generate and download, or downloading a previously generated key by clicking download.On GNU/Linux systems make sure that the key file has read only rights for the owner (400).
Example syntax of an SSH command using a key:
ssh -i path_to_the_downloaded_key -2 -p 22223 -l cli ip_address command
- option: -i sets the path to the downloaded key file,
- option: -2 sets the version of the SSH protocol used for the connection,
- option: -p sets the connection port (default: 22223),
- option: -l sets the user (the user must be cli),
- option: ip_address sets the IP address of the storage server you want to connect to,
- option: command; use 'help' to show all available commands.
Note
Every time the generate and download button is pressed, it generates a new key and the old key expires.