1 ssh2.0 configuration, Ssh2.0 overview, Introduction to ssh2.0 – H3C Technologies H3C S5120 Series Switches User Manual
Page 479: Operation of ssh, Ssh2.0 configuration

1-1
1
SSH2.0 Configuration
This chapter includes these sections:
z
z
Configuring the Device as an SSH Server
z
Configuring the Device as an SSH Client
z
Displaying and Maintaining SSH
z
SSH Server Configuration Examples
z
SSH Client Configuration Examples
SSH2.0 Overview
Introduction to SSH2.0
Secure Shell (SSH) offers an approach to logging into a remote device securely. By encryption and
strong authentication, it protects devices against attacks such as IP spoofing and plain text password
interception.
The device can not only work as an SSH server to support connections with SSH clients, but also work
as an SSH client to allow users to establish SSH connections with a remote device acting as the SSH
server.
z
Currently, when acting as an SSH server, the device supports two SSH versions: SSH2.0 and
SSH1. When acting as an SSH client, the device supports SSH2.0 only.
z
Unless otherwise noted, SSH in this document refers to SSH2.0.
Operation of SSH
The session establishment and interaction between an SSH client and the SSH server involves the
following five stages:
Table 1-1 Stages in session establishment and interaction between an SSH client and the server
Stages
Description
SSH1 and SSH2.0 are supported. The two parties negotiate a
version to use.
SSH supports multiple encryption algorithms. The two parties
negotiate an algorithm for communication.
The SSH server authenticates the client in response to the client’s
authentication request.