64 ssh configuration, Ssh2.0 overview, Algorithm and key – H3C Technologies H3C WX6000 Series Access Controllers User Manual
Page 606: Ssh configuration
64-1
64
SSH Configuration
When configuring SSH, go to these sections for information you are interested in:
z
z
Configuring the Device as an SSH Server
z
Configuring the Device as an SSH Client
z
Displaying and Maintaining SSH
z
SSH Server Configuration Examples
z
SSH Client Configuration Examples
The term switch in this document refers to a switch in a generic sense or an access controller
configured with the switching function unless otherwise specified.
SSH2.0 Overview
Secure Shell (SSH) offers an approach to securely logging into a remote device. By encryption and
strong authentication, it protects devices against attacks such as IP spoofing and plain text password
interception.
The device can not only work as an SSH server to support connections with SSH clients, but also work
as an SSH client to allow users to establish SSH connections with a remote device acting as the SSH
server.
Currently, when acting as an SSH server, the device supports two SSH versions: SSH2 and SSH1.
When acting as an SSH client, the device supports SSH2 only.
Algorithm and Key
Algorithm is a set of transformation rules for encryption and decryption. Information without being
encrypted is known as plain text, while information that is encrypted is known as cipher text. Encryption
and decryption are performed using a string of characters called a key, which controls the
transformation between plain text and cipher text, for example, changing the plain text into cipher text or
cipher text into plain text.