SSH Overview·········································································································································1-1
Introduction to SSH ·························································································································1-1
Algorithm and Key ···························································································································1-1
Asymmetric Key Algorithm ··············································································································1-2
SSH Operating Process ··················································································································1-2
Configuring the SSH Server····················································································································1-4
Configuring the SSH Client ···················································································································1-12
SSH Configuration Examples ···············································································································1-21
Table of Contents
i