Secure Shell (SSH) is a command-line access mode primarily used to gain remote shell access to Sophos UTM on AWS. It is typically used for low-level maintenance or troubleshooting. To access this shell you need an SSH client, which usually comes with most Linux distributions. For Windows you can download an SSH client for free, e.g. PuTTY (www.putty.org) or DameWare (www.dameware.com).
Note – To enable SSH shell access, passwords must be set initially. In addition, you can only specify passwords that adhere to the password complexity settings as configured on the Definitions & Users > Authentication Services > Advanced tab. That is, if you have enabled complex passwords, shell user passwords must meet the same requirements.
Accessing Sophos UTM on AWS via SSH
To access Sophos UTM on AWS via SSH, connect via SSH port (TCP 22 by default) using your normal SSH utility program (e.g. PuTTY).
You can log in as
- loginuser by prompting loginuser and the associated password as set above at the SSH or
- root after you have logged in as loginuser by typing su - and entering the associated password as set above.
Note – Any modifications done by root will void your support. Even users not logged in as root have direct access to a lot of information on Sophos UTM on AWS and should be considered privileged users. Therefore, it is strongly recommended to grant SSH access only to administrators in WebAdmin. For any configuration change, use instead.
In this section you can define an authentication method for SSH access and the strictness of access. The following authentication methods are available:
- Password (default)
- Public key
- Password and public key
To use these options select the respective checkboxes. To use Public Key Authentication you need to upload the respective public key(s) into the field Authorized Keys for loginuser for all users allowed to authenticate via their public key(s).
Allow root login: You can allow SSH access for the root user. This option is disabled by default as it leads to a higher security risk. When this option is enabled, the root user is able to log in via their public key. Upload the public key(s) for the root user into the field Authorized Keys for root.
Click Apply to save your settings.
This option lets you change the TCP port used for SSH. By default, this is the standard SSH port 22. To change the port, enter an appropriate value in the range from 1024 to 65535 in the Port number box and click Apply.