Chapter 46 System
Figure 358 SSL Client Authentication
You next see the Web Configurator login screen.
3
Figure 359 Secure Web Configurator Login Screen
46.8 SSH
You can use SSH (Secure SHell) to securely access the UAG's command line interface. Specify
which zones allow SSH access and from which IP address the access can come.
SSH is a secure communication protocol that combines authentication and data encryption to
provide secure encrypted communication between two hosts over an unsecured network. In the
following figure, computer A on the Internet uses SSH to securely connect to the WAN port of the
UAG for a management session.
UAG Series User's Guide
518