ZyXEL Communications 91-009-073003B ユーザーズマニュアル

ページ / 944
Chapter 45 System
ZyWALL USG 50 User’s Guide
708
2
Encryption Method
Once the identification is verified, both the client and server must agree on the 
type of encryption method to use.
3
Authentication and Data Transmission
After the identification is verified and data encryption activated, a secure tunnel 
is established between the client and the server. The client then sends its 
authentication information (user name and password) to the server to log in to 
the server.
45.7.2  SSH Implementation on the ZyWALL
Your ZyWALL supports SSH versions 1 and 2 using RSA authentication and four 
encryption methods (AES, 3DES, Archfour, and Blowfish). The SSH server is 
implemented on the ZyWALL for management using port 22 (by default). 
45.7.3  Requirements for Using SSH
You must install an SSH client program on a client computer (Windows or Linux 
operating system) that is used to connect to the ZyWALL over SSH.
45.7.4  Configuring SSH
Click Configuration > System > SSH to change your ZyWALL’s Secure Shell 
settings. Use this screen to specify from which zones SSH can be used to manage 
the ZyWALL. You can also specify from which IP addresses the access can come.