Maintenance of SSH public keys of known hosts
The vRouter uses the SSH client in various subsystems to allow secure data exchange or file transfer with other trusted systems in the network. The identity of SSH servers can be verified by an SSH public-key which gets checked upon each connection attempt by the SSH client. To prevent Man-in-the-Middle attacks, when a malicious system tries to act as the designated SSH server, the SSH public-key of the server gets verified on each connection attempt by the vRouter .