10.1.2 Authentication using Virtual Networks
Authenticated
Communication path
To set up authentication by using a virtual network, you must first set up a TCP/IP communication
path between the client and Internet Gatekeeper by using a virtual network (SSH/VPN, etc.), which
must be authenticated. The client connects to Internet Gatekeeper through the authenticated path. In
addition, only authenticated client is able to connect to the gateway.
This section describes settings, which apply if you use SSH (F-Secure SSH, openssh, TTSSH, etc.).
For example, the following software use SSH:
■
Reflection for Secure IT(previously known as "F-Secure SSH")
http://www.attachmate.com/en-US
/Products/Host+Connectivity/Security/Reflection+for+Secure+IT
Server/Client. SSH2 support. OS: Windows/UNIX.
GUI. Japanese language support. Technical support.
■
Openssh
Server/Client. SSH2 support. OS: mainly UNIX.
Teraterm/TTSSH
■
Client. GUI. Japanese language support. OS: Windows.
Putty http://www.chiark.greenend.org.uk/~sgtatham/putty/
■
Client. SSH2 support. GUI. OS: Windows.
■
PortForwarder
Client. GUI for port forwarding. OS: Windows.
F-Secure Internet Gatekeeper for Linux/Administrator's Guide
Web server
Mail server
Anti-Virus Gateway
SSH/VPN server
Internet
SSH/VPN client
Client A
http://www.openssh.com/
http://hp.vector.co.jp/authors/VA002416/
http://www.fuji-climb.org/pf/JP/
Access prohibited
Client B
100
Need help?
Do you have a question about the INTERNET GATEKEEPER FOR LINUX 4.01 and is the answer not in the manual?