Configuring enhanced security About enhanced security Configuring enhanced security Configuring remote logging using SSH reverse tunnel