beautypg.com

Ssh2.0 configuration, Ssh2.0 overview, Introduction to ssh2.0 – H3C Technologies H3C SecPath F1000-E User Manual

Page 57: Operation of ssh

background image

1

SSH2.0 Configuration

This chapter includes these sections:

SSH2.0 Overview

Configuring the Device as an SSH Server

Configuring the Device as an SSH Client

Displaying and Maintaining SSH

SSH Server Configuration Examples

SSH Client Configuration Examples

SSH2.0 Overview

Introduction to SSH2.0

Secure Shell (SSH) offers an approach to logging into a remote device securely. By encryption and strong

authentication, it protects devices against attacks such as IP spoofing and plain text password

interception.
The device can not only work as an SSH server to support connections with SSH clients, but also work as

an SSH client to allow users to establish SSH connections with a remote device acting as the SSH server.

NOTE:

Currently, when acting as an SSH server, the device supports two SSH versions: SSH2.0 and SSH1.
When acting as an SSH client, the device supports SSH2.0 only.

Unless otherwise noted, SSH in this document refers to SSH2.0.

Operation of SSH

The session establishment and interaction between an SSH client and the SSH server involves the

following five stages:

Table 1 Stages in session establishment and interaction between an SSH client and the server

Stages Description

Version negotiation

SSH1 and SSH2.0 are supported. The two parties
negotiate a version to use.

Key and algorithm negotiation

SSH supports multiple encryption algorithms. The two
parties negotiate an algorithm for communication.

Authentication

The SSH server authenticates the client in response to
the client’s authentication request.

Session request

After passing authentication, the client sends a session
request to the server.