F-Secure Internet Gatekeeper for Linux/Administrator’s Guide
100
10.1.2
Authentication using Virtual Networks
To set up authentication by using a virtual network, you must first set up a TCP/IP communication
path between the client and Internet Gatekeeper by using a virtual network (SSH/VPN, etc.), which
must be authenticated. The client connects to Internet Gatekeeper through the authenticated path. In
addition, only authenticated client is able to connect to the gateway.
This section describes settings, which apply if you use SSH (F-Secure SSH, openssh, TTSSH, etc.).
For example, the following software use SSH:
■
Reflection for Secure IT(previously known as “F-Secure SSH”)
http://www.attachmate.com/en-US
/Products/Host+Connectivity/Security/Reffor+IT
Server/Client. SSH2 support. OS: Windows/UNIX.
GUI. Japanese language support. Technical support.
■
Openssh
http://www.openssh.com/
Server/Client. SSH2 support. OS: mainly UNIX.
■
Teraterm/TTSSH
http://hp.vector.co.jp/authors/VA002416/
Client. GUI. Japanese language support. OS: Windows.
■
Putty
http://www.chiark.greenend.org.uk/~sgtatham/putty/
Client. SSH2 support. GUI. OS: Windows.
■
PortForwarder
http://www.fuji-climb.org/pf/JP/
Client. GUI for port forwarding. OS: Windows.
Internet
Anti-Virus Gateway
Mail server
Web server
Access prohibited
SSH/VPN server
Client A
Client B
Authenticated
Communication path
SSH/VPN client