Chapter 15 System
NWA1000 Series User’s Guide
150
2 Encryption Method
Once the identification is verified, both the client and server must agree on the type of encryption
method to use.
3 Authentication and Data Transmission
After the identification is verified and data encryption activated, a secure tunnel is established
between the client and the server. The client then sends its authentication information (user name
and password) to the server to log in to the server.
15.5.2 SSH Implementation on the NWA1000 Series
Your NWA1000 Series supports SSH versions 1 and 2 using RSA authentication and four encryption
methods (AES, 3DES, Archfour, and Blowfish). The SSH server is implemented on the NWA1000 Series for
management using port 22 (by default).
15.5.3 Requirements for Using SSH
You must install an SSH client program on a client computer (Windows or Linux operating system) that is
used to connect to the NWA1000 Series over SSH.
15.5.4 Configuring SSH
Click Configuration > System > SSH to open the following screen. Use this screen to configure your
NWA1000 Series’s Secure Shell settings.
Note: It is recommended that you disable Telnet and FTP when you configure SSH for secure
connections.
Figure 94 Configuration > System > SSH
The following table describes the labels in this screen.
Table 66 Configuration > System > SSH
LABEL DESCRIPTION
Enable Select the check box to allow or disallow the computer with the IP address that matches the IP
address(es) in the Service Control table to access the NWA1000 Series CLI using this service.
Note: The NWA1000 Series uses only SSH version 2 protocol.
Server Port You may change the server port number for a service if needed, however you must use the
same port number in order to use that service for remote management.