3Com 8800 Configuration Manual page 740

3com 8800: install guide
Hide thumbs Also See for 8800:
Table of Contents

Advertisement

3Com Switch 8800 Configuration Guide
Server
Server
Figure 50-2 Establish an SSH channel through a WAN
To establish an SSH authentication secure connection, the server and the client must
go through the following five phases:
1)
Version number negotiation:
The client sends a TCP connection request.
After the TCP connection is established, the server and the client negotiate the
version number.
If the negotiation succeeds, the key algorithm negotiation phase starts; otherwise,
the server tears down the TCP connection.
2)
Key algorithm negotiation:
The server generates a RSA key pair randomly, and sends the public key in the
key pair to the client.
The client uses the public key from the server and a random number generated
locally (in length of eight bytes) as parameters to calculate the session key.
Using the public key from the server, the client encrypts the random number for
calculating the session key and sends the result to the server.
Using the local private key, the server decrypts the data sent by the client and
obtains the random number used by the client.
The server uses the public key and the random number from the client as
parameters to calculate the session key with the same algorithm as on the client.
The resulting key is 16 bytes long.
On completion of the above steps, the server and the client obtains the same session
key. During the session, both ends use the same session key to perform encryption and
decryption, thereby guaranteeing the security of data transfer.
3)
Authentication mode negotiation:
The client sends its username information to the server.
W orkstation
W orkstation
Local switch
Local Ethernet
Local Ethernet
Laptop
Laptop
PC
SSH
SSH client
Remote switch
SSH
SSH server
Chapter 50 SSH Terminal Service
WAN
WAN
Remote Ethernet
Remote Ethernet
PC
PC
50-2
W orkstation
Laptop
Laptop
Server
Server

Advertisement

Table of Contents
loading

Table of Contents