Chapter 41 System
UAG5100 User’s Guide
423
Figure 289
SSL Client Authentication
3
You next see the Web Configurator login screen.
Figure 290
Secure Web Configurator Login Screen
41.8 SSH
You can use SSH (Secure SHell) to securely access the UAG’s command line interface. Specify
which zones allow SSH access and from which IP address the access can come.
SSH is a secure communication protocol that combines authentication and data encryption to
provide secure encrypted communication between two hosts over an unsecured network. In the
following figure, computer A on the Internet uses SSH to securely connect to the WAN port of the
UAG for a management session.