Authentication Using Virtual Networks - F-SECURE INTERNET GATEKEEPER FOR LINUX 4.01 Administrator's Manual

Table of Contents

Advertisement

10.1.2 Authentication using Virtual Networks

Authenticated
Communication path
To set up authentication by using a virtual network, you must first set up a TCP/IP communication
path between the client and Internet Gatekeeper by using a virtual network (SSH/VPN, etc.), which
must be authenticated. The client connects to Internet Gatekeeper through the authenticated path. In
addition, only authenticated client is able to connect to the gateway.
This section describes settings, which apply if you use SSH (F-Secure SSH, openssh, TTSSH, etc.).
For example, the following software use SSH:
Reflection for Secure IT(previously known as "F-Secure SSH")
http://www.attachmate.com/en-US
/Products/Host+Connectivity/Security/Reflection+for+Secure+IT
Server/Client. SSH2 support. OS: Windows/UNIX.
GUI. Japanese language support. Technical support.
Openssh
Server/Client. SSH2 support. OS: mainly UNIX.
Teraterm/TTSSH
Client. GUI. Japanese language support. OS: Windows.
Putty http://www.chiark.greenend.org.uk/~sgtatham/putty/
Client. SSH2 support. GUI. OS: Windows.
PortForwarder
Client. GUI for port forwarding. OS: Windows.
F-Secure Internet Gatekeeper for Linux/Administrator's Guide
Web server
Mail server
Anti-Virus Gateway
SSH/VPN server
Internet
SSH/VPN client
Client A
http://www.openssh.com/
http://hp.vector.co.jp/authors/VA002416/
http://www.fuji-climb.org/pf/JP/
Access prohibited
Client B
100

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the INTERNET GATEKEEPER FOR LINUX 4.01 and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Internet gatekeeper for linux version 4

Table of Contents