ZyXEL 2WG Betriebsanweisung
Chapter 23 Remote Management Screens
ZyWALL 2WG User’s Guide
453
23.11 Remote Management Technical Reference
How SSH Works
The following table summarizes how a secure connection is established between two remote
hosts.
hosts.
Figure 290 How SSH Works
1 Host Identification
The SSH client sends a connection request to the SSH server. The server identifies itself
with a host key. The client encrypts a randomly generated session key with the host key
and server key and sends the result back to the server.
with a host key. The client encrypts a randomly generated session key with the host key
and server key and sends the result back to the server.
Encryption Algorithm
The Encryption Algorithm field is used to encrypt communications between
the ZyWALL and the Vantage CNM server. Choose from None (no
encryption), DES or 3DES. The Encryption Key field appears when you
select DES or 3DES. The ZyWALL must use the same encryption algorithm
as the Vantage CNM server.
Encryption Key
Type eight alphanumeric characters ("0" to "9", "a" to "z" or "A" to "Z") when
you choose the DES encryption algorithm and 24 alphanumeric characters
("0" to "9", "a" to "z" or "A" to "Z") when you choose the 3DES encryption
algorithm. The ZyWALL must use the same encryption key as the Vantage
CNM server.
Apply
Click Apply to save your changes back to the ZyWALL.
Reset
Click Reset to begin configuring this screen afresh.
Table 147 ADVANCED > REMOTE MGMT > CNM (continued)
LABEL
DESCRIPTION