Secure Telnet Using Ssh Examples - ZyXEL Communications ISG50-ISDN User Manual

Integrated service gateway
Hide thumbs Also See for ISG50-ISDN:
Table of Contents

Advertisement

Chapter 52 System
The following table describes the labels in this screen.
Table 277 Configuration > System > SSH
LABEL
Enable
Version 1
Server Port
Server
Certificate
Service Control
Add
Edit
Remove
Move
#
Zone
Address
Action
Apply
Reset

52.8.5 Secure Telnet Using SSH Examples

This section shows two examples using a command interface and a graphical interface SSH client
program to remotely access the ISG50. The configuration and connection steps are similar for most
SSH client programs. Refer to your SSH client program user's guide.
52.8.5.1 Example 1: Microsoft Windows
This section describes how to access the ISG50 using the Secure Shell Client program.
Launch the SSH client and specify the connection information (IP address, port number) for the
1
ISG50.
Configure the SSH client to accept connection using SSH version 1.
2
696
DESCRIPTION
Select the check box to allow or disallow the computer with the IP address that
matches the IP address(es) in the Service Control table to access the ISG50 CLI
using this service.
Select the check box to have the ISG50 use both SSH version 1 and version 2
protocols. If you clear the check box, the ISG50 uses only SSH version 2 protocol.
You may change the server port number for a service if needed, however you
must use the same port number in order to use that service for remote
management.
Select the certificate whose corresponding private key is to be used to identify the
ISG50 for SSH connections. You must have certificates already configured in the
My Certificates screen (Click My Certificates and see
for details).
This specifies from which computers you can access which ISG50 zones.
Click this to create a new entry. Select an entry and click Add to create a new
entry after the selected entry. Refer to
screen that opens.
Double-click an entry or select it and click Edit to be able to modify the entry's
settings.
To remove an entry, select it and click Remove. The ISG50 confirms you want to
remove it before doing so. Note that subsequent entries move up by one when
you take this action.
To change an entry's position in the numbered list, select the method and click
Move to display a field to type a number for where you want to put it and press
[ENTER] to move the rule to the number that you typed.
This the index number of the service control rule.
This is the zone on the ISG50 the user is allowed or denied to access.
This is the object name of the IP address(es) with which the computer is allowed
or denied to access.
This displays whether the computer with the IP address specified above can
access the ISG50 zone(s) configured in the Zone field (Accept) or not (Deny).
Click Apply to save your changes back to the ISG50.
Click Reset to return the screen to its last-saved settings.
Chapter 50 on page 643
Table 275 on page 683
for details on the
ISG50 User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Isg50

Table of Contents