Operation Manual – SSH
H3C S5500-EI Series Ethernet Switches
Chapter 1 SSH Configuration
1-1
Chapter 1 SSH Configuration
When configuring SSH, go to these sections for information you are interested in:
z
SSH2.0 Overview
z
Configuring the Device as an SSH Server
z
Configuring the Device as an SSH Client
z
Displaying and Maintaining SSH
z
SSH Server Configuration Examples
z
SSH Client Configuration Examples
1.1 SSH2.0 Overview
Secure Shell (SSH) offers an approach to securely logging into a remote device. By
encryption and strong authentication, it protects devices against attacks such as IP
spoofing and plain text password interception.
The device can not only work as an SSH server to support connections with SSH
clients, but also work as an SSH client to allow users to establish SSH connections with
a remote device acting as the SSH server.
Note:
Currently, when acting as an SSH server, the device supports two SSH versions: SSH2
and SSH1. When acting as an SSH client, the device supports SSH2 only.
1.1.1 Algorithm and Key
Algorithm is a set of transformation rules for encryption and decryption. Information
without being encrypted is known as plain text, while information that is encrypted is
known as cipher text. Encryption and decryption are performed using a string of
characters called a key, which controls the transformation between plain text and cipher
text, for example, changing the plain text into cipher text or cipher text into plain text.
Figure 1-1
Encryption and decryption