Configuring Ssh - Check Point UTM-1 Edge User Manual

Internet security appliance
Hide thumbs Also See for UTM-1 Edge:
Table of Contents

Advertisement

Configuring SSH

UTM-1 appliance users can control the appliance via the command line, using the SSH
(Secure Shell) management protocol. You can enable users to do so via the Internet, by
configuring remote SSH access. You can also integrate the UTM-1 appliance with SSH-
based management systems.
Note: The UTM-1 appliance supports SSHv2 clients only. The SSHv1 protocol
contains security vulnerabilities and is not supported.
Note: Configuring SSH is equivalent to creating a simple Allow rule, where the
destination is This Gateway. To create more complex rules for SSH, such as allowing
SSH connections from multiple IP address ranges, define Allow rules for TCP port
22, with the destination This Gateway. For information, see Using Rules on page
334.
To configure SSH
Click Setup in the main menu, and click the Management tab.
1.
The Management page appears.
2.
Specify from where SSH access should be granted.
See Access Options on page 594 for information.
Warning: If remote SSH is enabled, your UTM-1 appliance settings can be changed
remotely, so it is especially important to make sure all UTM-1 appliance users'
passwords are difficult to guess.
Chapter 19: Maintenance

Configuring SSH

595

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the UTM-1 Edge and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents

Save PDF