ZyXEL 2WG Guía Del Usuario

Descargar
Página de 780
 Chapter 23 Remote Management Screens
ZyWALL 2WG User’s Guide
453
23.11  Remote Management Technical Reference
How SSH Works  
The following table summarizes how a secure connection is established between two remote 
hosts. 
Figure 290   How SSH Works
Host Identification
The SSH client sends a connection request to the SSH server. The server identifies itself 
with a host key. The client encrypts a randomly generated session key with the host key 
and server key and sends the result back to the server. 
Encryption Algorithm
The Encryption Algorithm field is used to encrypt communications between 
the ZyWALL and the Vantage CNM server. Choose from None (no 
encryption), DES or 3DES. The Encryption Key field appears when you 
select DES or 3DES. The ZyWALL must use the same encryption algorithm 
as the Vantage CNM server. 
Encryption Key
Type eight alphanumeric characters ("0" to "9", "a" to "z" or "A" to "Z") when 
you choose the DES encryption algorithm and 24 alphanumeric characters 
("0" to "9", "a" to "z" or "A" to "Z") when you choose the 3DES encryption 
algorithm. The ZyWALL must use the same encryption key as the Vantage 
CNM server. 
Apply
Click Apply to save your changes back to the ZyWALL.
Reset
Click Reset to begin configuring this screen afresh.
Table 147   ADVANCED > REMOTE MGMT > CNM (continued)
LABEL
DESCRIPTION