Last Updated: 2024-12-12
Purpose
This article describes how to set up remote SSH access to the text console in the HIAB.
Introduction
The HIAB solution can be set up to allow SSH connections from the client computer to facilitate the setup and configuration remotely. The HIAB is hardened by default and therefore this functionality is not enabled by default. The SSH authentication only allows keys and does not support the use of password authentication.
Remote access to the text console can be useful if the HIAB GUI becomes unavailable, and the remote support requires to be started.
The SSH connection to the HIAB does not provide you with a SSH terminal, only access to the HIAB Console is allowed.
Requirements
-
Verify that the HIAB Server is pingable. If HIAB Server Pingable is set to NO, remote SSH access to the HIAB console is not possible. See the section about Configure UI Management Interface in the HIAB Console document on how to configure HIAB Server Pingable.
-
Verify that the client from which you would like to connect from can connect to the HIAB over TCP port 22.
-
Enable and configure the service according to the information in this document.
-
Access to the program puttygen and the PuTTY terminal.
Configuration
Enable Remote SSH Access
To access the HIAB using SSH, the remote SSH access need to be enabled.
To enable remote SSH access:
-
Navigate to Main Menu > Settings > Server.
-
Click the Remote tab to access settings for SSH.
-
In the Settings section, set Enable Remote SSH Access to yes in the drop-down menu.
-
In the Enabled On Network Interface drop-down menu, select which interface the service should be available on.
-
Click Save and the service will become available.
Generating Keys
To connect to the SSH service you need to supply your public key. This is generated in the program puttygen. The required key that you need to supply to the tool is marked in the figure.
-
Store the private key for later use, as it is required when you connect to the service.
-
Copy the public key and store it in a text file on one line. The file can later be uploaded through the upload functionality available in the GUI.
While storing the key, do not use the file generated by the Save public key button in putty key generator. The public key need to be in OpenSSH format.
Adding Generated Key to the GUI
To add new keys:
-
Click New in the Allowed SSH Keys section. The Maintaining Remote SSH Key window is displayed.
The following options are presented:
|
Option |
Description |
|---|---|
|
From IP address |
The IP address of the remote machine. (Optional) |
|
Name |
Name of the remote host. |
|
SSH Key |
The generated public key of the remote machine. |
-
Enter the name of the remote host.
-
Enter the SSH generated public key.
To remove unwanted keys, click Delete.
Click Upload to upload keys via text file by entering the search path to the file stored previously in the section Generating Keys.
Setting up PuTTY
After adding the SSH keys to the HIAB, the PuTTY console need to be set up.
-
Open the PuTTY and insert the IP-address or Host Name for the HIAB.
-
Click Connection > Data in the Category tree section to the left.
-
The username for the connection is hiab_console. Add the HIAB console username in Auto-login username to be established the connection.
-
Click SSH > Auth in the Category tree section to the left, and set up PuTTY to use the private key file you stored in section Generating Keys.
-
Click Open to start the connection.
-
Enter the Key Passphrase you entered in the PuTTY Key Generator when you saved your private key.
If you stored the private key without passphrase, this step is skipped and you will be logged on directly.
If the file has been uploaded without any errors into HIAB and you have defined the user name in PuTTY, then you are now able to connect to the HIAB appliance with the use of the private key in PuTTY.
Related Articles
- Windows 10/Windows 2019 Server
- HIAB Updates
- General Information about SMB/WinRM Scanning
- Change Risk Levels
- Removing an Agent from Windows
- ServiceNow - Legacy
- Windows 8.1
- Netsec Filters
- Discovering the Agent in OUTSCAN
- Technical Specification
- Account Settings
- How to Test SMB Authentication
- Windows 2016 Server
- Identity Provider Settings
- HIAB Server Settings
- Installing a Linux Agent
- Okta Identity Provider Configuration
- Scanning-Less Scanning
- Check Connectivity to Agent Server
- Scan Scheduling Errors
- Overview
- Event Notification Module
- HIAB Maintenance Settings
- HIAB Deployment Guide
- Database Connector (HIAB only)
- Azure AD Identity Provider Configuration
- Add Comments
- Target Groups
- Checking if Agent is Running
- Core Installation
- Windows 2008 R2 Server
- Agent Installation Introduction
- Automatic Asset Joining With Netsec
- Manage Users
- Firewall Setup for Agents
- Scanning Range
- SNMP (HIAB only)
- ADFS Identity Provider Configuration
- Splunk
- Agent Call Home
- Advanced Report Filters
- Accept Risks
- SMB Authentication from OUTSCAN/HIAB
- Virtual HIAB Appliance
- Using the Agent Info Command
- Amazon
- User Roles
- Removing an Agent from Linux
- Retrieving the Agent UUID
- Atlassian Jira
- Understanding Scanner and Scheduler
- Finding the Agent Version
- Create and Edit Event Notifications
- Installing a macOS Agent
- Syslog (HIAB only)
- Setting Up an Agent Using System Proxy
- ServiceNow - App
- Thycotic
- DNS Lookup in UI and in Console
- HIAB Console
- Auditing Guide
- Adding Agent Attributes
- HIAB Distribution Settings
- Run Verification Scans
- Agent Latest Version
- Finding New Agents In OUTSCAN
- Setting up a HIAB as an Appsec Scale Scanner
- Hardening the HIAB
- Performing a PCI DSS Scan
- Two Factor Authentication
- Attributes
- Firewall Rules
- HIAB Enrollment
- Supported Platforms for Authenticated SSH Scanning
- Authenticated Scanning Using WinRM
- OneLogin Identity Provider Configuration
- Windows 7
- HIAB Remote Support
- Compliance Scanning
- Manage Targets
- Assign Tasks
- Authenticated Scanning Using SSH
- Tickets Quick Start Guide
- Retrieving Results From the Agent in OUTSCAN
- Appliance Logs
- Converting Normal with Webapp Scans (Netsec) to Portal Workflows
- Updating the Agent
- Troubleshooting SMB Authentication
- Agent Licensing
- Mark as False Positives
- Installing a Windows Agent
- Using Farsight in Netsec
- Testing Target System for Open TCP Ports
- HIAB Restore
- Scan Stages
- Request Clarifications
- HIAB Setup Guide
- Updating Agent Attributes
- CyberArk
- LDAP/AD
- Checking if the Agent has Produced Results
- ArcSight (HIAB only)
- HIAB E-mail Whitelisting
- Adjust Identity Provider SAML Metadata File
- Scanning Critical Industrial Devices/Machines
- Reporting Tools
- Scan Scheduling
- Scanning Performance and Impact Tuning
- PCI Compliance Scanning
- Configuring and Accessing the HIAB console using SSH
- User Groups
- Create Users
- HIAB Remote SSH Guide
- Download Agents
- Create Targets
- Windows 2012 R2 Server
- HIAB Backup
- Report Scheduling
- Access Tokens
- O24AUTH
- Complementary Authenticated Scan on Default Credentials
- Authenticated Scanning Using SMB
- Dynamic Target Group