Overview; Algorithms - Allied Telesis AT-8100L/8 User Manual

Fast ethernet switches at-8100 series management software command line interface user’s guide alliedware plus version 2.2.5
Hide thumbs Also See for AT-8100L/8:
Table of Contents

Advertisement

Chapter 90: Secure Shell (SSH) Server

Overview

Algorithms

1412
The Secure Shell (SSH) protocol is an alternative to the Telnet protocol for
remote management of the switch from workstations on your network. The
difference between the two management methods is that SSH
management is more secure because the packets the switch and your
management workstation exchange during management sessions are
encrypted. In contrast, Telnet management sessions are unsecured and
are vulnerable to snooping because the packets are sent in readable text.
The SSH server on the switch supports SSH protocol versions 1.3, 1.5,
and 2.0. Client software is available on the Internet.
The SSH server on the switch encrypts the packets using an encryption
key. The key is created with an algorithm. You can choose from three
available algorithms to create the key for SSH:
RSA
RSA1
DSA

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents