1 SSH Configuration·····································································································································1-1
SSH Overview·········································································································································1-1
Introduction to SSH ·························································································································1-1
Algorithm and Key ···························································································································1-1
Asymmetric Key Algorithm ··············································································································1-2
SSH Operating Process ··················································································································1-2
Configuring the SSH Server····················································································································1-5
Creating an SSH User and Specifying an Authentication Type ······················································1-8
Configuring the SSH Client ···················································································································1-12
SSH Configuration Examples ···············································································································1-22
Table of Contents
i