This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| router_to_router_ssh [2021/09/21 18:47] – [How To] hogwild | router_to_router_ssh [2025/10/17 18:38] (current) – [Passwordless Router-to-Router SSH Notes] hogwild | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== Enable | + | ====== Enable Password-less Router-to-Router SSH Encryption ====== | 
| ===== Overview ===== | ===== Overview ===== | ||
| - | FreshTomato includes [[https:// | + | This setup allows | 
| + | FreshTomato includes [[https:// | ||
| - | ===== How To ===== | + | \\ | 
| - |  | + |  | 
| + |  | ||
| + | * As seen below, for switching wireless radio(s) on/off on a schedule (not shown). | ||
| - | \\ {{: | + | ===== Setting up/ | 
| - | - Now, copy and paste the “Public Key portion” from the primary router | + | Follow these steps to generate a Keypair and establish an SSH tunnel: | 
| - | \\ {{: | + | - On the primary router (the one issuing SSH commands) generate a Keypair \\ by typing the command: | 
| + | - Copy the Public key portion from the primary router and paste it  \\ into the “Authorized Keys” field in secondary router: \\ \\ {{: | ||
| + | - In the above screenshot, a pre-existing, | ||
| + | - Now, connect to the secondary router via SSH (running on the primary router). | ||
| - | [Note that a pre-existing, | + | \\ | 
| - | \\ 03 - Connect to the secondary router from within an SSH session [running on the primary router]. The example below uses the **nvram** command to display the host name. The first command string [**ssh root@192.168.10.1 nvram get lan_hostname**] executes the command on the secondary router and then it is executed locally [**nvram get lan_hostname**]. | + | \\ | 
| - | \\ {{: | + | \\ | 
| - | \\ **Example** | ||
| - | Enable/ | + | ===== Usage Example ===== | 
| - | \\ 01 - Status before [Primary | + | This example enables/ | 
| - | \\ {{: | + | - This screenshot shows the Primary router' | 
| + | - Now, we run the command ("// | ||
| + | - This shows the status after the command is run: \\ \\ {{: | ||
| - | \\ 02 - Command [**ssh root@192.168.10.1 | + | \\ Since "radio toggle 1" is a toggle switch, if the same command is repeated, the eth1 interface will be disabled on the primary router. | 
| - | \\ {{: | + | \\ | 
| - | \\ 03 - Status after. | + | \\ | 
| - | \\ {{: | + | ===== Passwordless Router-to-Router SSH Notes ===== | 
| - | [If the same command is repeated, eth1 will be switched | + | * The SSH daemon must be enabled on both routers. \\ \\ | 
| + | * The key generated | ||
| + |  | ||
| + | * Be prepared to repeat (steps 1. and 2.) after a reboot, removing\\ any redundant key from the secondary | ||
| - | \\ **Notes** | + | \\ This guide was produced using [[https:// | 
| - | \\ SSH must be enabled on both routers. \\ The key generated is not preserved across a reboot of the [primary] router. Either keep a copy of the id_dropbear file offline [on a UFD or “CIFS Client” share] for restoration, | + | Inspiration | 
| + | |||
| + | \\ | ||
| + | |||
| + | \\ | ||