This procedure allows IDS MC to authenticate itself with the sensor without entering a password.
Whatever key generation technique, there is a general rule of thumb: Always generate the key pair on the host that is to keep the private key. This avoids ever having to transfer the private key between hosts.
In the case of RSA Authentication, the public key is then set up on the sensor using the "ssh authorized-keys" command. At the time of authentication, the sensor makes the client prove it has access to the private key.
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...