
Operation Manual – SSH
H3C S5600 Series Ethernet Switches
Chapter 1 SSH Configuration
1-1
Chapter 1 SSH Configuration
Note:
The DSA algorithm is newly added in SSH configuration. Click the following links for
related information:
z
Generating/Destroying Key Pairs
z
Creating an SSH User and Specifying an Authentication Type
z
Configuring the Public Key of a Client on the Server
When configuring SSH, go to these sections for information you are interested:
z
SSH Overview
z
SSH Server and Client Configuration Task List
z
Displaying and Maintaining SSH Configuration
z
Comparison of SSH Commands with the Same Functions
z
SSH Configuration Examples
1.1 SSH Overview
1.1.1 Introduction to SSH
Secure Shell (SSH) is a protocol that provides secure remote login and other security
services in insecure network environments. In an SSH connection, data are encrypted
before being sent out and decrypted after they reach the destination. This prevents
attacks such as plain text password interception. Besides, SSH also provides powerful
user authentication functions that prevent attacks such as DNS and IP spoofing.
SSH adopts the client-server model. The device can be configured as an SSH client or
an SSH server. In the former case, the device establishes a remote SSH connection to
an SSH server. In the latter case, the device provides connections to multiple clients.
Furthermore, SSH can also provide data compression to increase transmission speed,
take the place of Telnet or provide a secure “channel” for FTP.