EasyManua.ls Logo

Check Point UTM-1 Edge - Configuring SSH

Check Point UTM-1 Edge
707 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Configuring SSH
Chapter 19: Maintenance 595
Configuring SSH
UTM-1 appliance users can control the appliance via the command line, using the SSH
(Secure Shell) management protocol. You can enable users to do so via the Internet, by
configuring remote SSH access. You can also integrate the UTM-1 appliance with SSH-
based management systems.
Note: The UTM-1 appliance supports SSHv2 clients only. The SSHv1 protocol
contains security vulnerabilities and is not supported.
Note: Configuring SSH is equivalent to creating a simple Allow rule, where the
destination is This Gateway. To create more complex rules for SSH, such as allowing
SSH connections from multiple IP address ranges, define Allow rules for TCP port
22, with the destination This Gateway. For information, see Using Rules on page
334.
To configure SSH
1. Click Setup in the main menu, and click the Management tab.
The Management page appears.
2. Specify from where SSH access should be granted.
See Access Options on page
594 for information.
Warning: If remote SSH is enabled, your UTM-1 appliance settings can be changed
remotely, so it is especially important to make sure all UTM-1 appliance users’
passwords are difficult to guess.

Table of Contents

Related product manuals