This table contains the fingerprints of the public keys for all users who
are authorized to access the router.
To prevent man in the middle attacks, users should make sure the
user's fingerprint, as printed in the connection process, is similar
to the one printed here.