User's Manual
Chapter 52 System
ISG50 User’s Guide
696
The following table describes the labels in this screen.
52.8.5 Secure Telnet Using SSH Examples
This section shows two examples using a command interface and a graphical interface SSH client
program to remotely access the ISG50. The configuration and connection steps are similar for most
SSH client programs. Refer to your SSH client program user’s guide.
52.8.5.1 Example 1: Microsoft Windows
This section describes how to access the ISG50 using the Secure Shell Client program.
1 Launch the SSH client and specify the connection information (IP address, port number) for the
ISG50.
2 Configure the SSH client to accept connection using SSH version 1.
Table 277 Configuration > System > SSH
LABEL DESCRIPTION
Enable Select the check box to allow or disallow the computer with the IP address that
matches the IP address(es) in the Service Control table to access the ISG50 CLI
using this service.
Version 1 Select the check box to have the ISG50 use both SSH version 1 and version 2
protocols. If you clear the check box, the ISG50 uses only SSH version 2 protocol.
Server Port You may change the server port number for a service if needed, however you
must use the same port number in order to use that service for remote
management.
Server
Certificate
Select the certificate whose corresponding private key is to be used to identify the
ISG50 for SSH connections. You must have certificates already configured in the
My Certificates screen (Click My Certificates and see Chapter 50 on page 643
for details).
Service Control This specifies from which computers you can access which ISG50 zones.
Add Click this to create a new entry. Select an entry and click Add to create a new
entry after the selected entry. Refer to Table 275 on page 683 for details on the
screen that opens.
Edit Double-click an entry or select it and click Edit to be able to modify the entry’s
settings.
Remove To remove an entry, select it and click Remove. The ISG50 confirms you want to
remove it before doing so. Note that subsequent entries move up by one when
you take this action.
Move To change an entry’s position in the numbered list, select the method and click
Move to display a field to type a number for where you want to put it and press
[ENTER] to move the rule to the number that you typed.
# This the index number of the service control rule.
Zone This is the zone on the ISG50 the user is allowed or denied to access.
Address This is the object name of the IP address(es) with which the computer is allowed
or denied to access.
Action This displays whether the computer with the IP address specified above can
access the ISG50 zone(s) configured in the Zone field (Accept) or not (Deny).
Apply Click Apply to save your changes back to the ISG50.
Reset Click Reset to return the screen to its last-saved settings.