Nokia IPSO 4.0 Cell Phone User Manual


 
Nokia Network Voyager for IPSO 4.0 Reference Guide 307
3. Click Apply.
4. (Optional) In the Configure Server Access Control table, enter the group and user names in
the appropriate text boxes.
You can use wild card characters when you specify multiple group or user names separated
by spaces.
Note
If you specify users or groups, only those users and groups are allowed or forbidden.
Group settings only apply to a user’s primary group—the GID setting in the Voyager
Password page. For more information on how to configure users and groups, see
“Managing User Accounts” on page 288 and “Managing Groups” on page 292.
5. Click Apply.
6. Click the option to use in the Permit Admin User to Log In field.
The default is Yes, which allows the admin user to log in using SSH.
7. Click Apply
8. In the Configure Server Authentication of Users table, click Yes for each authentication
option to be used.
Note
You can authenticate SSH connections by using public keys (for RSA and DSA SSHv2),
standard user and password information, rhosts files, RSA keys (for SSHv1), or any
combination of these methods. In all cases the default is Yes, except for rhost and rhost
with RSA authentication. The rhost utility is insecure and Nokia does not recommend
using it.
9. Click Apply
10. (Optional) In the Configure User Login Environment table, click Yes for each desired
action.
The default is Yes in the Print message of the day on login field. The default is No in the Use
login(1) program for interactive logins field.
11. Click Apply
12. (Optional) In the Configure Server Protocol Details table, select the method of encryption
(SSHv2), enter appropriate values in the text boxes, and click the choice to use in the Send
Keepalives to the Other Side and Protocol Version(s) fields.
The default settings are Yes and Both 1 and 2 in these fields respectively.
Note
The default setting in the Cipher to use field is all ciphers on. If you deselect all choices
in the this field, the setting reverts to the default setting.