Ssh Configuration; Ssh Overview; Introduction To Ssh; Algorithm And Key - H3C S3100 Series Operation Manual

H3c s3100 series ethernet switches operation manual
Hide thumbs Also See for S3100 Series:
Table of Contents

Advertisement

1

SSH Configuration

When configuring SSH, go to these sections for information you are interested:

SSH Overview

SSH Server and Client Configuration Task List
Displaying and Maintaining SSH Configuration
Comparison of SSH Commands with the Same Functions
SSH Configuration Examples
SSH Overview

Introduction to SSH

Secure Shell (SSH) is a protocol that provides secure remote login and other security services in
insecure network environments. In an SSH connection, data are encrypted before being sent out and
decrypted after they reach the destination. This prevents attacks such as plain text password
interception. Besides, SSH also provides powerful user authentication functions that prevent attacks
such as DNS and IP spoofing.
SSH adopts the client-server model. The device can be configured as an SSH client or an SSH server.
In the former case, the device establishes a remote SSH connection to an SSH server. In the latter case,
the device provides connections to multiple clients.
Furthermore, SSH can also provide data compression to increase transmission speed, take the place of
Telnet or provide a secure "channel" for FTP.
Currently, when functioning as an SSH server, an S3100-EI switch supports SSH2 and SSH1,
while an S3100-SI switch supports only SSH2.
When functioning as an SSH client, an S3100 switch supports only SSH2.
Unless otherwise noted, SSH refers to SSH2 throughout this document.

Algorithm and Key

Algorithm is a set of transformation rules for encryption and decryption. Information without being
encrypted is known as plain text, while information that is encrypted is known as cipher text. Encryption
and decryption are performed using a string of characters called a key, which controls the
transformation between plain text and cipher text, for example, changing the plain text into cipher text or
cipher text into plain text.
1-1

Advertisement

Chapters

Table of Contents
loading

Table of Contents