ZyXEL ISG50-PSTN User Guide - Page 696
Secure Telnet Using SSH Examples
View all ZyXEL ISG50-PSTN manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 696 highlights
Chapter 52 System The following table describes the labels in this screen. Table 277 Configuration > System > SSH LABEL DESCRIPTION Enable Select the check box to allow or disallow the computer with the IP address that matches the IP address(es) in the Service Control table to access the ISG50 CLI using this service. Version 1 Select the check box to have the ISG50 use both SSH version 1 and version 2 protocols. If you clear the check box, the ISG50 uses only SSH version 2 protocol. Server Port You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. Server Certificate Select the certificate whose corresponding private key is to be used to identify the ISG50 for SSH connections. You must have certificates already configured in the My Certificates screen (Click My Certificates and see Chapter 50 on page 643 for details). Service Control This specifies from which computers you can access which ISG50 zones. Add Click this to create a new entry. Select an entry and click Add to create a new entry after the selected entry. Refer to Table 275 on page 683 for details on the screen that opens. Edit Double-click an entry or select it and click Edit to be able to modify the entry's settings. Remove To remove an entry, select it and click Remove. The ISG50 confirms you want to remove it before doing so. Note that subsequent entries move up by one when you take this action. Move To change an entry's position in the numbered list, select the method and click Move to display a field to type a number for where you want to put it and press [ENTER] to move the rule to the number that you typed. # This the index number of the service control rule. Zone This is the zone on the ISG50 the user is allowed or denied to access. Address This is the object name of the IP address(es) with which the computer is allowed or denied to access. Action This displays whether the computer with the IP address specified above can access the ISG50 zone(s) configured in the Zone field (Accept) or not (Deny). Apply Click Apply to save your changes back to the ISG50. Reset Click Reset to return the screen to its last-saved settings. 52.8.5 Secure Telnet Using SSH Examples This section shows two examples using a command interface and a graphical interface SSH client program to remotely access the ISG50. The configuration and connection steps are similar for most SSH client programs. Refer to your SSH client program user's guide. 52.8.5.1 Example 1: Microsoft Windows This section describes how to access the ISG50 using the Secure Shell Client program. 1 Launch the SSH client and specify the connection information (IP address, port number) for the ISG50. 2 Configure the SSH client to accept connection using SSH version 1. 696 ISG50 User's Guide