Chapter 1 Ssh Configuration; Ssh Overview; Introduction To Ssh - H3C S5600 Series Operation Manual

Hide thumbs Also See for H3C S5600 Series:
Table of Contents

Advertisement

Operation Manual – SSH
H3C S5600 Series Ethernet Switches

Chapter 1 SSH Configuration

Note:
The DSA algorithm is newly added in SSH configuration. Click the following links for
related information:
Generating/Destroying Key Pairs
Creating an SSH User and Specifying an Authentication Type
Configuring the Public Key of a Client on the Server
When configuring SSH, go to these sections for information you are interested:

SSH Overview

SSH Server and Client Configuration Task List
Displaying and Maintaining SSH Configuration
Comparison of SSH Commands with the Same Functions
SSH Configuration Examples
1.1 SSH Overview

1.1.1 Introduction to SSH

Secure Shell (SSH) is a protocol that provides secure remote login and other security
services in insecure network environments. In an SSH connection, data are encrypted
before being sent out and decrypted after they reach the destination. This prevents
attacks such as plain text password interception. Besides, SSH also provides powerful
user authentication functions that prevent attacks such as DNS and IP spoofing.
SSH adopts the client-server model. The device can be configured as an SSH client or
an SSH server. In the former case, the device establishes a remote SSH connection to
an SSH server. In the latter case, the device provides connections to multiple clients.
Furthermore, SSH can also provide data compression to increase transmission speed,
take the place of Telnet or provide a secure "channel" for FTP.
1-1
Chapter 1 SSH Configuration

Advertisement

Table of Contents
loading

This manual is also suitable for:

S5600-26cS5600-26c-pwrS5600-26fS5600-50cS5600-50c-pwr

Table of Contents