Chapter 15 System
2When Authenticate Client Certificates is selected on the
3You next see the Web Configurator login screen.
15.6 SSH
You can use SSH (Secure SHell) to securely access the
SSH is a secure communication protocol that combines authentication and data encryption to provide secure encrypted communication between two hosts over an unsecured network. In the following figure, computer B on the Internet uses SSH
| 209 |
|
|