beautypg.com

64 ssh configuration, Ssh2.0 overview, Algorithm and key – H3C Technologies H3C WX6000 Series Access Controllers User Manual

Page 606: Ssh configuration

background image

64-1

64

SSH Configuration

When configuring SSH, go to these sections for information you are interested in:

z

SSH2.0 Overview

z

Configuring the Device as an SSH Server

z

Configuring the Device as an SSH Client

z

Displaying and Maintaining SSH

z

SSH Server Configuration Examples

z

SSH Client Configuration Examples

The term switch in this document refers to a switch in a generic sense or an access controller
configured with the switching function unless otherwise specified.

SSH2.0 Overview

Secure Shell (SSH) offers an approach to securely logging into a remote device. By encryption and
strong authentication, it protects devices against attacks such as IP spoofing and plain text password
interception.

The device can not only work as an SSH server to support connections with SSH clients, but also work
as an SSH client to allow users to establish SSH connections with a remote device acting as the SSH
server.

Currently, when acting as an SSH server, the device supports two SSH versions: SSH2 and SSH1.
When acting as an SSH client, the device supports SSH2 only.

Algorithm and Key

Algorithm is a set of transformation rules for encryption and decryption. Information without being
encrypted is known as plain text, while information that is encrypted is known as cipher text. Encryption
and decryption are performed using a string of characters called a key, which controls the
transformation between plain text and cipher text, for example, changing the plain text into cipher text or
cipher text into plain text.