Security / GDC and SSH |
This topic covers prerequisites and SSH connection options.
In order to determine how to proceed, you will need the following information about your environment:
We recommend reading about SSH and how to configure it. We will not cover this topic in this document.
To ensure that your data is encrypted, select SSH or SSH2. Both offer data compression and port forwarding; the difference is SSH2 has different implementation code and a more advanced encryption algorithm than SSH.
If you are using the shortcut buttons in the Genero Desktop Client, two connections are established between the client and the server. The first connection is established from the client to the server, in order to log in and start the application. The second connection is made from the server's application to the client, in order to display the graphical data.
Use the Table 1 to determine which settings you will need.
Type of connection | Command encrypted | GUI encrypted |
---|---|---|
telnet | NO | NO |
ssh | X | NO |
ssh port forwarding | X | X |
ssh2 | X | NO |
ssh2 port forwarding | X | X |
Knowledge of your configuration will be necessary to make Genero work properly, as discussed at the start of this topic. Use Table 2 to determine which connection methods will support what you are trying to do. Currently the SSH or SSH2 with Port Forwarding provides the most flexible connectivity.
Table 2 uses the following legend:
telnet | SSH | SSH + Port Forwarding | SSH2 | SSH2 + Port Forwarding | |
---|---|---|---|---|---|
Firewall or NAT on Server Side | 1 | 1 | 1 | 1 | 1 |
Firewall or NAT on Client Side | 2 | 2 | X | 2 | X |
Firewall or NAT on Both Sides | 1,2 | 1,2 | 1 | 1,2 | 1 |
Private Network | X | X | X | X | X |
VPN (Same as Private Network) | X | X | X | X | X |
Encryption of all Data | NO | NO | X | NO | X |
Password/login Encrypted | NO | X | X | X | X |
Keep Alive | NO | NO | X, 3 | NO | X, 3 |