Chapter 24 System
Authentication and Data Transmission
3
After the identification is verified and data encryption activated, a secure tunnel is established
between the client and the server. The client then sends its authentication information (user
name and password) to the server to log in to the server.
24.8.2 SSH Implementation on the NXC
Your NXC supports SSH versions 1 and 2 using RSA authentication and four encryption methods
(AES, 3DES, Archfour, and Blowfish). The SSH server is implemented on the NXC for management
using port 22 (by default).
24.8.3 Requirements for Using SSH
You must install an SSH client program on a client computer (Windows or Linux operating system)
that is used to connect to the NXC over SSH.
24.8.4 Configuring SSH
Click Configuration > System > SSH to change your NXC's Secure Shell settings. Use this screen
to specify from which zones SSH can be used to manage the NXC. You can also specify from which
IP addresses the access can come.
Note: It is recommended that you disable Telnet and FTP when you configure SSH for
secure connections.
Figure 162 Configuration > System > SSH
284
NXC2500 User's Guide