(12.02-en) Configuring the Secure Terminal
With the following settings, you can configure and manage access to devices via a secure terminal.
Misc > Settings > Remote Access > External terminal client: Command line for the external terminal client, made up of the path to the executable (e.g.Â
putty.exe
) and the appropriate parameters. IGEL recommends PuTTY.
For PuTTy under MS Windows, the minimal command line without further configuration is:[Path and file name for putty.exe]Â -telnet <hostname> -P <port>
For PuTTy under Linux, the minimal command line without further configuration is:[Path and file name for the PuTTy executable] -telnet <hostname> -P <port>
<port>
 andÂ<hostname>
are placeholders that are automatically replaced by the port number and the IP address of the device during execution. Background: The actual connection to the device is provided by the UMS and is available to the external terminal client as a tunnel.Examples:
PuTTy under MS Windows:
If the External terminal client field is empty, the internal terminal client of the UMS will be used.C:\Program Files\PuTTY\putty.exe -telnet <hostname> -P <port>
PuTTy under Linux:/bin/putty -telnet <hostname> -P <port>
- Misc > Settings > Remote Access > Show end dialog if two or more sessions are open
If two or more sessions are open, a closing dialog will be shown if you attempt to close a window of the external terminal client.
No closing dialog will be shown when you close the window of the external terminal client.
- Misc > Settings > Remote Access > Show warning for sessions that end unexpectedlyÂ
A warning will be shown if a session with an external terminal client was terminated without any user input.
No warning will be shown.
- UMS Administration > Global Configuration > Remote Access > Enable secure terminal globally
Access via the secure terminal is enabled for all registered devices. The firmware must be IGEL Linux version 5.11.100 or higher.
Access via the secure terminal is not enabled for all registered devices. However, it can be enabled for individual devices.
- UMS Administration > Global Configuration > Remote Access > Log user for secure terminals: Specifies whether the user name of the UMS user who established the connection to the device is logged. The log is shown under System > Logging > Remote Access.
The user name is contained in the log.
The user name is not contained in the log.
- System > Logging > Remote Access: Shows the log of all secure access to devices.
The following data are logged:- Device Name
- MAC Address
- Unit ID
- Device IP
- User: The user name of the UMS user who established the connection to the device is logged. This is only logged if Log user name for SSH remote access is enabled.
- VNC Start time: Point in time at which the connection was established
- Duration in seconds
- Comment
- Protocol: Connection protocol