ZyXEL Communications ISG50 ユーザーズマニュアル

ページ / 880
 Chapter 52 System
ISG50 User’s Guide
695
3
Authentication and Data Transmission
After the identification is verified and data encryption activated, a secure tunnel is established 
between the client and the server. The client then sends its authentication information (user 
name and password) to the server to log in to the server.
52.8.2  SSH Implementation on the ISG50
Your ISG50 supports SSH versions 1 and 2 using RSA authentication and four encryption methods 
(AES, 3DES, Archfour, and Blowfish). The SSH server is implemented on the ISG50 for 
management using port 22 (by default). 
52.8.3  Requirements for Using SSH
You must install an SSH client program on a client computer (Windows or Linux operating system) 
that is used to connect to the ISG50 over SSH.
52.8.4  Configuring SSH
Click Configuration > System > SSH to change your ISG50’s Secure Shell settings. Use this 
screen to specify from which zones SSH can be used to manage the ISG50. You can also specify 
from which IP addresses the access can come.
Note: It is recommended that you disable Telnet and FTP when you configure SSH for 
secure connections.
Figure 472   
Configuration > System > SSH