Chapter 32 Remote Management
X2002 User’s Guide
442
1
Host Identification
The SSH client sends a connection request to the SSH server. The server
identifies itself with a host key. The client encrypts a randomly generated
session key with the host key and server key and sends the result back to the
server.
The client automatically saves any new server public keys. In subsequent
connections, the server public key is checked against the saved version on the
client computer.
2
Encryption Method
Once the identification is verified, both the client and server must agree on the
type of encryption method to use.
3
Authentication and Data Transmission
After the identification is verified and data encryption activated, a secure tunnel
is established between the client and the server. The client then sends its
authentication information (user name and password) to the server to log in to
the server.
Secure Telnet Using SSH Examples
This section shows two examples using a command interface and a graphical
interface SSH client program to remotely access the X2002. The configuration and
connection steps are similar for most SSH client programs. Refer to your SSH
client program user’s guide.
Example 1: Microsoft Windows
This section describes how to access the X2002 using the Secure Shell Client
program.
1
Launch the SSH client and specify the connection information (IP address, port
number or device name) for the X2002.
2
Configure the SSH client to accept connection using SSH version 1.
Summary of Contents for X2002
Page 2: ......
Page 24: ...Table of Contents X2002 User s Guide 24...
Page 25: ...25 PART I User s Guide...
Page 26: ...26...
Page 40: ...Chapter 2 How It Works X2002 User s Guide 40...
Page 99: ...99 PART II Technical Reference...
Page 100: ...100...
Page 124: ...Chapter 5 Network Deployment X2002 User s Guide 124...
Page 166: ...Chapter 7 Auto Provision X2002 User s Guide 166...
Page 170: ...Chapter 8 QoS X2002 User s Guide 170...
Page 248: ...Chapter 16 Click To Talk Group X2002 User s Guide 248...
Page 252: ...Chapter 17 Group Access Code X2002 User s Guide 252...
Page 304: ...Chapter 19 Auto Attendant X2002 User s Guide 304...
Page 312: ...Chapter 20 LCR X2002 User s Guide 312...
Page 346: ...Chapter 22 Call Services X2002 User s Guide 346...
Page 380: ...Chapter 25 Status Observation X2002 User s Guide 380...
Page 402: ...Chapter 27 Call Detail Record CDR X2002 User s Guide 402...
Page 410: ...Chapter 28 ACD Logs X2002 User s Guide 410...
Page 416: ...Chapter 29 Administrator Accounts X2002 User s Guide 416...
Page 424: ...Chapter 30 Diagnostics X2002 User s Guide 424...
Page 426: ...Chapter 31 X2002 User s Guide 426...
Page 446: ...Chapter 32 Remote Management X2002 User s Guide 446...
Page 448: ...Chapter 33 TFTP Management X2002 User s Guide 448...
Page 462: ...Chapter 35 License Control X2002 User s Guide 462...
Page 482: ...Chapter 36 Web Portal X2002 User s Guide 482...
Page 508: ...Chapter 39 Product Specifications X2002 User s Guide 508...
Page 548: ...Appendix C Legal Information X2002 User s Guide 548...
Page 562: ...Index X2002 User s Guide 562...