ZyXEL Communications ISG50 ユーザーズマニュアル
Chapter 52 System
ISG50 User’s Guide
695
3
Authentication and Data Transmission
After the identification is verified and data encryption activated, a secure tunnel is established
between the client and the server. The client then sends its authentication information (user
name and password) to the server to log in to the server.
between the client and the server. The client then sends its authentication information (user
name and password) to the server to log in to the server.
52.8.2 SSH Implementation on the ISG50
Your ISG50 supports SSH versions 1 and 2 using RSA authentication and four encryption methods
(AES, 3DES, Archfour, and Blowfish). The SSH server is implemented on the ISG50 for
management using port 22 (by default).
(AES, 3DES, Archfour, and Blowfish). The SSH server is implemented on the ISG50 for
management using port 22 (by default).
52.8.3 Requirements for Using SSH
You must install an SSH client program on a client computer (Windows or Linux operating system)
that is used to connect to the ISG50 over SSH.
that is used to connect to the ISG50 over SSH.
52.8.4 Configuring SSH
Click Configuration > System > SSH to change your ISG50’s Secure Shell settings. Use this
screen to specify from which zones SSH can be used to manage the ISG50. You can also specify
from which IP addresses the access can come.
screen to specify from which zones SSH can be used to manage the ISG50. You can also specify
from which IP addresses the access can come.
Note: It is recommended that you disable Telnet and FTP when you configure SSH for
secure connections.
Figure 472
Configuration > System > SSH