Chapter 46 System
Encryption Method
2
Once the identification is verified, both the client and server must agree on the
type of encryption method to use.
Authentication and Data Transmission
3
After the identification is verified and data encryption activated, a secure tunnel
is established between the client and the server. The client then sends its
authentication information (user name and password) to the server to log in to
the server.
46.7.2 SSH Implementation on the ZyWALL
Your ZyWALL supports SSH versions 1 and 2 using RSA authentication and four
encryption methods (AES, 3DES, Archfour, and Blowfish). The SSH server is
implemented on the ZyWALL for management using port 22 (by default).
46.7.3 Requirements for Using SSH
You must install an SSH client program on a client computer (Windows or Linux
operating system) that is used to connect to the ZyWALL over SSH.
46.7.4 Configuring SSH
Click System > SSH to change your ZyWALL's Secure Shell settings. Use this
screen to specify from which zones SSH can be used to manage the ZyWALL. You
can also specify from which IP addresses the access can come.
Note: It is recommended that you disable Telnet and FTP when you configure SSH
for secure connections.
Figure 494 System > SSH
734
ZyWALL USG 2000 User's Guide