Using SSH Proxy in ZBT-6416 Router


In the ZBT-6416, you can utilize an SSH proxy. Note that these features are not available in the AR150 firmware. Follow these instructions for setup:

1. Navigate to the "SSH Proxy" page.
2. Check "Enable SSH Proxy" and "Enable transparency."
3. Input your SSH server, using either an IP address or domain name.
4. Input your SSH username.
5. Select RSA for the authentication method. There is a known issue with password authentication that remains unresolved.
6. Copy the entire content of your RSA file, including the first and last lines.
7. Click Apply.
8. Refresh the page several times until both "SSH proxy" and "Transparent routing" statuses show "Yes." If not, you may lose internet connectivity.

 


Obtaining the RSA File

If you have an SSH server, you likely have a username and password. Some servers require RSA for enhanced security, eliminating the need to enter your password each time. For instance, Amazon EC2 mandates downloading a xxxx.pem file during instance creation, which serves as your RSA file.

If you only have a password, you can generate an RSA file. Follow these guides:

- [Generating SSH keys on GitHub](https://help.github.com/articles/generating-ssh-keys/)
- [Generating RSA keys on Linux](https://www.cyberciti.biz/faq/linux-generating-rsa-keys/)

On your Linux system, use:
```sh
ssh-keygen -t rsa
```
Follow the prompts to generate two files, `id_rsa` and `id_rsa.pub`.

Next, upload the key to your server. If the key is not uploaded, you cannot proceed.

```sh
ssh-copy-id yourusername@your-server
```

Then, you can log in using the RSA content.

 

 


About ZBT

ZBT designs and manufactures cutting-edge network hardware and software solutions, offering affordable and secure connectivity for households and businesses worldwide. With over a decade of industry experience, ZBT excels in solving everyday internet challenges and delivering complex networking solutions for smart buildings and IoT networks. At ZBT, we believe a robust and secure network foundation is critical for business success, and we prioritize network security and reliability for our partners.

RELATED ARTICLES