Chapter 1 Ssh Configuration; Ssh2.0 Overview; Algorithm And Key - H3C S5500-EI series Operation Manual

Hide thumbs Also See for S5500-EI series:
Table of Contents

Advertisement

Operation Manual – SSH
H3C S5500-EI Series Ethernet Switches

Chapter 1 SSH Configuration

When configuring SSH, go to these sections for information you are interested in:

SSH2.0 Overview

Configuring the Device as an SSH Server
Configuring the Device as an SSH Client
Displaying and Maintaining SSH
SSH Server Configuration Examples
SSH Client Configuration Examples
1.1 SSH2.0 Overview
Secure Shell (SSH) offers an approach to securely logging into a remote device. By
encryption and strong authentication, it protects devices against attacks such as IP
spoofing and plain text password interception.
The device can not only work as an SSH server to support connections with SSH
clients, but also work as an SSH client to allow users to establish SSH connections with
a remote device acting as the SSH server.
Note:
Currently, when acting as an SSH server, the device supports two SSH versions: SSH2
and SSH1. When acting as an SSH client, the device supports SSH2 only.

1.1.1 Algorithm and Key

Algorithm is a set of transformation rules for encryption and decryption. Information
without being encrypted is known as plain text, while information that is encrypted is
known as cipher text. Encryption and decryption are performed using a string of
characters called a key, which controls the transformation between plain text and cipher
text, for example, changing the plain text into cipher text or cipher text into plain text.
Figure 1-1 Encryption and decryption
1-1
Chapter 1 SSH Configuration

Advertisement

Table of Contents
loading

Table of Contents