Configuring Ssh; Overview; How Ssh Operates - HP 10500 Series Configuration Manual

Security configuration guide
Hide thumbs Also See for 10500 Series:
Table of Contents

Advertisement

Configuring SSH

This chapter describes SSH applications, how to configure SSH applications, and configuration
examples.

Overview

Secure Shell (SSH) is a network security protocol. Using encryption and authentication, SSH implements
remote login and file transfer securely over an insecure network.
SSH uses the typical client/server model, and establishes a channel to protect data transfer based on TCP.
SSH includes two versions: SSH1.x and SSH2.0 (hereinafter referred to as SSH1 and SSH2), which are
not compatible. SSH2 is better than SSH1 in performance and security.
The device can not only work as an SSH server to provide services to SSH clients, but also work as an
SSH client to allow users to establish SSH connections with a remote SSH server. When acting as an SSH
server, the device supports SSH and SSH1. When acting as an SSH client, the device supports SSH2
only.
The device supports the following SSH applications:
Secure Telnet (Stelnet)—Provides secure and reliable network terminal access services. Through
Stelnet, a user can log in to a remote server securely. Stelnet protects devices against attacks such
as IP spoofing and plain text password interception. The device can act as both the Stelnet server
and Stelnet client.
Secure File Transfer Protocol (SFTP)—Based on SSH2, SFTP uses the SSH connection to provide
secure file transfer. The device can serve as the SFTP server, allowing a remote user to log in to the
SFTP server for secure file management and transfer. The device can also serve as an SFTP client,
enabling a user to log in from the device to a remote device for secure file transfer.
SCP—Based on SSH2, SCP offers a secure approach to copying files. The device can act as an SCP
server, allowing a user to log in to the device for file upload and download. The device can also act
as an SCP client, enabling a user to log in from the device to a remote device for secure file transfer.
NOTE:
SCP is only available in Release 1208 and later versions.

How SSH operates

This example uses SSH2.
To establish an SSH connection and communicate with each other through the connection, an SSH client
and an SSH server go through the stages listed in
SSH Technology White Paper.
Table
13. For more information about these stages, see
200

Advertisement

Table of Contents
loading

Table of Contents