Table of Contents
44.1.1 Service Access Limitations ....................................................................................
588
44.1.2 System Timeout .....................................................................................................
44.2 HTTPS .............................................................................................................................
44.3 Configuring WWW ...........................................................................................................
589
44.4 Service Control Rules .....................................................................................................
592
44.5 HTTPS Example ..............................................................................................................
44.5.1 Internet Explorer Warning Messages .....................................................................
593
44.5.2 Netscape Navigator Warning Messages ................................................................
44.5.3 Avoiding Browser Warning Messages ....................................................................
594
44.5.4 Login Screen ..........................................................................................................
595
44.5.5 Enrolling and Importing SSL Client Certificates .....................................................
44.5.6 Using a Certificate When Accessing the ZyWALL Example ..................................
599
44.6 SSH ..............................................................................................................................
600
44.6.1 How SSH Works ....................................................................................................
44.6.2 SSH Implementation on the ZyWALL .....................................................................
601
44.6.3 Requirements for Using SSH .................................................................................
44.6.4 Configuring SSH ....................................................................................................
44.7 Secure Telnet Using SSH Examples ...............................................................................
603
44.7.1 Example 1: Microsoft Windows ..............................................................................
44.7.2 Example 2: Linux ....................................................................................................
44.8 Telnet ..............................................................................................................................
604
44.8.1 Configuring Telnet ..................................................................................................
44.9 Configuring FTP .............................................................................................................
605
44.10 SNMP ...........................................................................................................................
607
44.10.1 Supported MIBs ...................................................................................................
608
44.10.2 SNMP Traps .........................................................................................................
44.10.3 Configuring SNMP ...............................................................................................
44.11 Dial-in Management .......................................................................................................
609
44.11.1 a managementAT Command Strings ...................................................................
610
44.11.2 DTR Signal ...........................................................................................................
44.11.3 Response Strings .................................................................................................
44.12 Dial-in Mgmt Configuration ............................................................................................
44.13 Vantage CNM ................................................................................................................
611
44.14 Configuring Vantage CNM ..............................................................................................
Part VII: Maintenance & Troubleshooting..........................................
613
Chapter 45
File Manager..........................................................................................................................
615
45.1 Configuration Files and Shell Scripts Overview ..............................................................
45.1.1 Comments in Configuration Files or Shell Scripts ..................................................
616
27
ZyWALL USG 300 User’s Guide