Chapter 40 System
UAG4100 User’s Guide
391
Figure 270
SSL Client Authentication
3
You next see the Web Configurator login screen.
Figure 271
Secure Web Configurator Login Screen
40.8 SSH
You can use SSH (Secure SHell) to securely access the UAG’s command line interface. Specify
which zones allow SSH access and from which IP address the access can come.
SSH is a secure communication protocol that combines authentication and data encryption to
provide secure encrypted communication between two hosts over an unsecured network. In the
following figure, computer A on the Internet uses SSH to securely connect to the WAN port of the
UAG for a management session.