Chapter 26 Access Control
VES-1616F-3x Series User’s Guide
184
26.5 SSH Overview
Unlike Telnet or FTP, which transmit data in clear text, SSH (Secure Shell) is a secure
communication protocol that combines authentication and data encryption to provide secure
encrypted communication between two hosts over an unsecured network.
Figure 87
SSH Communication Example
26.6 How SSH works
The following table summarizes how a secure connection is established between two remote
hosts.
Figure 88
How SSH Works
1
Host Identification
The SSH client sends a connection request to the SSH server. The server identifies itself
with a host key. The client encrypts a randomly generated session key with the host key
and server key and sends the result back to the server.
The client automatically saves any new server public keys. In subsequent connections,
the server public key is checked against the saved version on the client computer.
2
Encryption Method
Summary of Contents for VDSL SWITCH VES-1616F-3X
Page 1: ...www zyxel com VES 1616F 3x Series VDSL Switch User s Guide Version 3 60 5 2007 Edition 2 ...
Page 2: ......
Page 7: ...Safety Warnings VES 1616F 3x Series User s Guide 7 ...
Page 8: ...Safety Warnings VES 1616F 3x Series User s Guide 8 ...
Page 28: ...List of Tables VES 1616F 3x Series User s Guide 28 ...
Page 30: ...30 ...
Page 34: ...Chapter 1 Getting to Know Your Switch VES 1616F 3x Series User s Guide 34 ...
Page 42: ...Chapter 3 Hardware Overview VES 1616F 3x Series User s Guide 42 ...
Page 44: ...44 ...
Page 62: ...Chapter 5 System Status and Port Statistics VES 1616F 3x Series User s Guide 62 ...
Page 84: ...Chapter 6 Basic Setting VES 1616F 3x Series User s Guide 84 ...
Page 86: ...86 ...
Page 106: ...Chapter 10 Spanning Tree Protocol VES 1616F 3x Series User s Guide 106 ...
Page 120: ...Chapter 15 Port Authentication VES 1616F 3x Series User s Guide 120 ...
Page 126: ...Chapter 17 Queuing Method VES 1616F 3x Series User s Guide 126 ...
Page 131: ...Chapter 18 Classifier VES 1616F 3x Series User s Guide 131 Figure 51 Classifier Example ...
Page 132: ...Chapter 18 Classifier VES 1616F 3x Series User s Guide 132 ...
Page 138: ...Chapter 19 Policy VES 1616F 3x Series User s Guide 138 Figure 53 Policy Example ...
Page 144: ...Chapter 20 VLAN Stacking VES 1616F 3x Series User s Guide 144 ...
Page 156: ...Chapter 21 Multicast VES 1616F 3x Series User s Guide 156 ...
Page 160: ...Chapter 22 Differentiated Services VES 1616F 3x Series User s Guide 160 ...
Page 161: ...161 PART IV Routing Protocol Static Route 163 DHCP Relay 165 ...
Page 162: ...162 ...
Page 168: ...168 ...
Page 178: ...Chapter 25 Maintenance VES 1616F 3x Series User s Guide 178 ...
Page 192: ...Chapter 27 Diagnostic VES 1616F 3x Series User s Guide 192 ...
Page 196: ...Chapter 28 Syslog VES 1616F 3x Series User s Guide 196 ...
Page 202: ...Chapter 29 Cluster Management VES 1616F 3x Series User s Guide 202 ...
Page 208: ...208 ...
Page 242: ...Chapter 32 Introducing the Commands VES 1616F 3x Series User s Guide 242 ...
Page 266: ...Chapter 34 IEEE 802 1Q Tagged VLAN Commands VES 1616F 3x Series User s Guide 266 ...
Page 274: ...Chapter 35 Troubleshooting VES 1616F 3x Series User s Guide 274 ...
Page 282: ...Chapter 36 Product Specifications VES 1616F 3x Series User s Guide 282 ...
Page 284: ...284 ...
Page 298: ...Appendix B Legal Information VES 1616F 3x Series User s Guide 298 ...