beautypg.com

Overview, Algorithms, Overview 8 – Allied Telesis AT-8100 Series User Manual

Page 1418: Algorithms 8

background image

Chapter 90: Secure Shell (SSH) Server

1418

Overview

The Secure Shell (SSH) protocol is an alternative to the Telnet protocol for
remote management of the switch from workstations on your network. The
difference between the two management methods is that SSH
management is more secure because the packets the switch and your
management workstation exchange during management sessions are
encrypted. In contrast, Telnet management sessions are unsecured and
are vulnerable to snooping because the packets are sent in readable text.

The SSH server on the switch supports SSH protocol versions 1.3, 1.5,
and 2.0. Client software is available on the Internet.

Algorithms

The SSH server on the switch encrypts the packets using an encryption
key. The key is created with an algorithm. You can choose from three
available algorithms to create the key for SSH:

RSA

RSA1

DSA