![]() The traffic from SSH clients (10.1.1.2/24 and 172.16.1.1/16) to the SSH server is encrypted. ![]() In this configuration example, the PIX Security Appliance is considered to be the SSH server. The security appliance allows a maximum of five concurrent SSH connections for each security context, if available, and a global maximum of 100 connections for all of the contexts combined. The Security Appliance allows SSH connections to the security appliance for management purposes. SSH traffic is encrypted in a tunnel and thereby helps protect passwords and other configuration commands from interception. Because Telnet communications are sent in clear text, which includes passwords, SSH is highly recommended. The configuration of the Series Security Appliance remotely with the command line involves the use of either Telnet or SSH. This document provides a sample configuration of Secure Shell (SSH) on the inside and outside interfaces of Cisco Series Security Appliance version 7.x and later. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |