Table of Contents

44.1.1 Service Access Limitations ....................................................................................

588

44.1.2 System Timeout .....................................................................................................

588

44.2 HTTPS .............................................................................................................................

588

44.3 Configuring WWW ...........................................................................................................

589

44.4 Service Control Rules .....................................................................................................

592

44.5 HTTPS Example ..............................................................................................................

592

44.5.1 Internet Explorer Warning Messages .....................................................................

593

44.5.2 Netscape Navigator Warning Messages ................................................................

593

44.5.3 Avoiding Browser Warning Messages ....................................................................

594

44.5.4 Login Screen ..........................................................................................................

595

44.5.5 Enrolling and Importing SSL Client Certificates .....................................................

595

44.5.6 Using a Certificate When Accessing the ZyWALL Example ..................................

599

44.6 SSH ..............................................................................................................................

600

44.6.1 How SSH Works ....................................................................................................

600

44.6.2 SSH Implementation on the ZyWALL .....................................................................

601

44.6.3 Requirements for Using SSH .................................................................................

601

44.6.4 Configuring SSH ....................................................................................................

601

44.7 Secure Telnet Using SSH Examples ...............................................................................

603

44.7.1 Example 1: Microsoft Windows ..............................................................................

603

44.7.2 Example 2: Linux ....................................................................................................

603

44.8 Telnet ..............................................................................................................................

604

44.8.1 Configuring Telnet ..................................................................................................

604

44.9 Configuring FTP .............................................................................................................

605

44.10 SNMP ...........................................................................................................................

607

44.10.1 Supported MIBs ...................................................................................................

608

44.10.2 SNMP Traps .........................................................................................................

608

44.10.3 Configuring SNMP ...............................................................................................

608

44.11 Dial-in Management .......................................................................................................

609

44.11.1 a managementAT Command Strings ...................................................................

610

44.11.2 DTR Signal ...........................................................................................................

610

44.11.3 Response Strings .................................................................................................

610

44.12 Dial-in Mgmt Configuration ............................................................................................

610

44.13 Vantage CNM ................................................................................................................

611

44.14 Configuring Vantage CNM ..............................................................................................

611

Part VII: Maintenance & Troubleshooting..........................................

613

Chapter 45

 

File Manager..........................................................................................................................

615

45.1 Configuration Files and Shell Scripts Overview ..............................................................

615

45.1.1 Comments in Configuration Files or Shell Scripts ..................................................

616

 

27

ZyWALL USG 300 User’s Guide