Chapter 36 System
ZyWALL USG 50-H User’s Guide
542
The following table describes the labels in this screen.
36.7.5 Secure Telnet Using SSH Examples
This section shows two examples using a command interface and a graphical interface SSH
client program to remotely access the ZyWALL. The configuration and connection steps are
similar for most SSH client programs. Refer to your SSH client program user’s guide.
36.7.5.1 Example 1: Microsoft Windows
This section describes how to access the ZyWALL using the Secure Shell Client program.
1
Launch the SSH client and specify the connection information (IP address, port number)
for the ZyWALL.
2
Configure the SSH client to accept connection using SSH version 1.
3
A window displays prompting you to store the host key in you computer. Click
Yes
to
continue.
Table 205
System > SSH
LABEL
DESCRIPTION
Enable
Select the check box to allow or disallow the computer with the IP address that
matches the IP address(es) in the
Service Control
table to access the ZyWALL
CLI using this service.
Version 1
Select the check box to have the ZyWALL use both SSH version 1 and version 2
protocols. If you clear the check box, the ZyWALL uses only SSH version 2
protocol.
Server Port
You may change the server port number for a service if needed, however you must
use the same port number in order to use that service for remote management.
Server
Certificate
Select the certificate whose corresponding private key is to be used to identify the
ZyWALL for SSH connections. You must have certificates already configured in the
My Certificates
screen (Click
My Certificates
and see
for
details).
Service Control
This specifies from which computers you can access which ZyWALL zones.
#
This the index number of the service control rule.
Zone
This is the zone on the ZyWALL the user is allowed or denied to access.
Address
This is the object name of the IP address(es) with which the computer is allowed or
denied to access.
Action
This displays whether the computer with the IP address specified above can
access the ZyWALL zone(s) configured in the
Zone
field (
Accept
) or not (
Deny
).
Add icon
Click the
Add
icon in the heading row to open a screen where you can add a new
rule. Refer to
for information on the fields.
Click the
Edit
icon to go to the screen where you can edit the rule.
Click the
Add
icon in an entry to add a rule below the current entry.
Click the
Delete
icon to remove an existing rule. A window display asking you to
confirm that you want to delete the rule. Note that subsequent rules move up by
one when you take this action.
Click the
Move to N
icon to display a field to type a number for where you want to
put that rule and press [ENTER] to move the rule to the number that you typed.
Apply
Click
Apply
to save your changes back to the ZyWALL.
Reset
Click
Reset
to begin configuring this screen afresh.
Summary of Contents for ZyWall USG 50-H Series
Page 2: ......
Page 10: ...Safety Warnings ZyWALL USG 50 H User s Guide 10...
Page 28: ...Table of Contents ZyWALL USG 50 H User s Guide 28...
Page 30: ...30...
Page 34: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 50 H User s Guide 34...
Page 40: ...Chapter 2 Features and Applications ZyWALL USG 50 H User s Guide 40...
Page 92: ...Chapter 5 Configuration Basics ZyWALL USG 50 H User s Guide 92...
Page 130: ...Chapter 6 Tutorials ZyWALL USG 50 H User s Guide 130...
Page 146: ...146...
Page 208: ...Chapter 8 Interface ZyWALL USG 50 H User s Guide 208 Figure 161 Network Interface Bridge Add...
Page 224: ...Chapter 9 Trunks ZyWALL USG 50 H User s Guide 224...
Page 250: ...Chapter 12 Zones ZyWALL USG 50 H User s Guide 250...
Page 280: ...Chapter 16 ALG ZyWALL USG 50 H User s Guide 280...
Page 286: ...Chapter 17 IP MAC Binding ZyWALL USG 50 H User s Guide 286...
Page 287: ...287 PART III Firewall Firewall 289...
Page 288: ...288...
Page 304: ...Chapter 18 Firewall ZyWALL USG 50 H User s Guide 304...
Page 306: ...306...
Page 356: ...Chapter 21 SSL User Screens ZyWALL USG 50 H User s Guide 356...
Page 358: ...Chapter 22 SSL User Application Screens ZyWALL USG 50 H User s Guide 358...
Page 368: ...Chapter 24 L2TP VPN ZyWALL USG 50 H User s Guide 368...
Page 394: ...Chapter 25 L2TP VPN Example ZyWALL USG 50 H User s Guide 394...
Page 395: ...395 PART V Application Patrol Application Patrol BWM 397...
Page 396: ...396...
Page 421: ...421 PART VI Anti X ADP 423...
Page 422: ...422...
Page 429: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 429 Figure 359 Profiles Traffic Anomaly...
Page 432: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 432 Figure 360 Profiles Protocol Anomaly...
Page 440: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 440...
Page 442: ...442...
Page 462: ...Chapter 29 Addresses ZyWALL USG 50 H User s Guide 462...
Page 474: ...Chapter 31 Schedules ZyWALL USG 50 H User s Guide 474...
Page 484: ...Chapter 32 AAA Server ZyWALL USG 50 H User s Guide 484...
Page 506: ...Chapter 34 Certificates ZyWALL USG 50 H User s Guide 506...
Page 510: ...Chapter 35 SSL Application ZyWALL USG 50 H User s Guide 510...
Page 511: ...511 PART VIII System System 513...
Page 512: ...512...
Page 552: ...552...
Page 584: ...Chapter 40 Diagnostics ZyWALL USG 50 H User s Guide 584...
Page 586: ...Chapter 41 Reboot ZyWALL USG 50 H User s Guide 586...
Page 596: ...Chapter 43 Product Specifications ZyWALL USG 50 H User s Guide 596...
Page 598: ...598...
Page 636: ...Appendix A Log Descriptions ZyWALL USG 50 H User s Guide 636...
Page 640: ...Appendix B Common Services ZyWALL USG 50 H User s Guide 640...
Page 646: ...Appendix C Importing Certificates ZyWALL USG 50 H User s Guide 646...