ZyWALL Series Internet Security Gateway
Remote Management Screens
18-15
Figure 18-11 SSH Communication Example
18.6 How SSH works
The following table summarizes how a secure connection is established between two remote hosts.
1. Host Identification
The SSH client sends a connection request to the
SSH server. The server identifies itself with a host
key. The client encrypts a randomly generated
session key with the host key and server key and
sends the result back to the server.
The client automatically saves any new server public
keys. In subsequent connections, the server public
key is checked again
st
the saved version on the
client
computer.
2. Encryption Method
Once the identification is verified, both the client and
server must agree on the type of encryption method
to use.
Figure 18-12How SSH Works
3. Authentication and Data Transmission
After the identification is verified and data encryption
activated, a secure tunnel is established between the
client and the server. The client then sends its
authentication information (user name and
password) to the server to log in to the server.
Summary of Contents for Internet Security Gateway ZyWALL 100
Page 1: ...ZyWALL 10W 30W 50 100 Internet Security Gateway User s Guide Version 3 62 February 2004 ...
Page 8: ......
Page 32: ......
Page 42: ......
Page 60: ......
Page 74: ......
Page 92: ......
Page 102: ......
Page 104: ......
Page 108: ......
Page 124: ...ZyWALL Series Internet Security Gateway 8 16 WAN Screens Figure 8 10 Dial Backup Setup ...
Page 132: ......
Page 134: ......
Page 156: ......
Page 170: ......
Page 218: ......
Page 224: ......
Page 235: ...ZyWALL Series Internet Security Gateway VPN Screens 15 11 Figure 15 5 VPN IKE ...
Page 260: ......
Page 262: ......
Page 282: ...ZyWALL Series Internet Security Gateway 16 20 Certificates Figure 16 9 Trusted CA Details ...
Page 298: ......
Page 300: ......
Page 308: ......
Page 350: ......
Page 351: ...Logs IX Part IX Logs This part provides information and instructions for the logs and reports ...
Page 352: ......
Page 356: ...ZyWALL Series Internet Security Gateway 20 4 Log Screens Figure 20 2 Log Settings ...
Page 364: ......
Page 365: ...Maintenance X Part X Maintenance This part covers the maintenance screens ...
Page 366: ......
Page 378: ......
Page 380: ......
Page 406: ......
Page 420: ......
Page 428: ......
Page 446: ......
Page 466: ......
Page 490: ......
Page 504: ......
Page 524: ......
Page 536: ......
Page 538: ......
Page 554: ......
Page 574: ......
Page 580: ......
Page 586: ......
Page 588: ......
Page 590: ......
Page 592: ......
Page 604: ......
Page 608: ......
Page 610: ......
Page 614: ......
Page 624: ......
Page 634: ......
Page 636: ......
Page 648: ......
Page 654: ......
Page 680: ......
Page 682: ......