Chapter 32 Remote Management
X2002 User’s Guide
442
1
Host Identification
The SSH client sends a connection request to the SSH server. The server
identifies itself with a host key. The client encrypts a randomly generated
session key with the host key and server key and sends the result back to the
server.
The client automatically saves any new server public keys. In subsequent
connections, the server public key is checked against the saved version on the
client computer.
2
Encryption Method
Once the identification is verified, both the client and server must agree on the
type of encryption method to use.
3
Authentication and Data Transmission
After the identification is verified and data encryption activated, a secure tunnel
is established between the client and the server. The client then sends its
authentication information (user name and password) to the server to log in to
the server.
Secure Telnet Using SSH Examples
This section shows two examples using a command interface and a graphical
interface SSH client program to remotely access the X2002. The configuration and
connection steps are similar for most SSH client programs. Refer to your SSH
client program user’s guide.
Example 1: Microsoft Windows
This section describes how to access the X2002 using the Secure Shell Client
program.
1
Launch the SSH client and specify the connection information (IP address, port
number or device name) for the X2002.
2
Configure the SSH client to accept connection using SSH version 1.
Содержание X2002
Страница 2: ......
Страница 24: ...Table of Contents X2002 User s Guide 24...
Страница 25: ...25 PART I User s Guide...
Страница 26: ...26...
Страница 40: ...Chapter 2 How It Works X2002 User s Guide 40...
Страница 99: ...99 PART II Technical Reference...
Страница 100: ...100...
Страница 124: ...Chapter 5 Network Deployment X2002 User s Guide 124...
Страница 166: ...Chapter 7 Auto Provision X2002 User s Guide 166...
Страница 170: ...Chapter 8 QoS X2002 User s Guide 170...
Страница 248: ...Chapter 16 Click To Talk Group X2002 User s Guide 248...
Страница 252: ...Chapter 17 Group Access Code X2002 User s Guide 252...
Страница 304: ...Chapter 19 Auto Attendant X2002 User s Guide 304...
Страница 312: ...Chapter 20 LCR X2002 User s Guide 312...
Страница 346: ...Chapter 22 Call Services X2002 User s Guide 346...
Страница 380: ...Chapter 25 Status Observation X2002 User s Guide 380...
Страница 402: ...Chapter 27 Call Detail Record CDR X2002 User s Guide 402...
Страница 410: ...Chapter 28 ACD Logs X2002 User s Guide 410...
Страница 416: ...Chapter 29 Administrator Accounts X2002 User s Guide 416...
Страница 424: ...Chapter 30 Diagnostics X2002 User s Guide 424...
Страница 426: ...Chapter 31 X2002 User s Guide 426...
Страница 446: ...Chapter 32 Remote Management X2002 User s Guide 446...
Страница 448: ...Chapter 33 TFTP Management X2002 User s Guide 448...
Страница 462: ...Chapter 35 License Control X2002 User s Guide 462...
Страница 482: ...Chapter 36 Web Portal X2002 User s Guide 482...
Страница 508: ...Chapter 39 Product Specifications X2002 User s Guide 508...
Страница 548: ...Appendix C Legal Information X2002 User s Guide 548...
Страница 562: ...Index X2002 User s Guide 562...