ZyXEL Communications ISG50 User Manual

Page of 880
 Chapter 52 System
ISG50 User’s Guide
693
2
When Authenticate Client Certificates is selected on the ISG50, the following screen asks you to 
select a personal certificate to send to the ISG50. This screen displays even if you only have a 
single certificate as in the example.
Figure 468   
SSL Client Authentication
3
You next see the Web Configurator login screen.
Figure 469   
Secure Web Configurator Login Screen
52.8  SSH   
You can use SSH (Secure SHell) to securely access the ISG50’s command line interface. Specify 
which zones allow SSH access and from which IP address the access can come. 
SSH is a secure communication protocol that combines authentication and data encryption to 
provide secure encrypted communication between two hosts over an unsecured network. In the