
36
SSH C
ONFIGURATION
SSH Overview
Introduction to SSH
Secure Shell (SSH) is a protocol that provides secure remote login and other
security services in insecure network environments. In an SSH connection, data are
encrypted before being sent out and decrypted after they reach the destination.
This prevents attacks such as plain text password interception. Besides, SSH also
provides powerful user authentication functions that prevent attacks such as DNS
and IP spoofing.
SSH adopts the client-server model. The device can be configured as an SSH client
or an SSH server. In the former case, the device establishes a remote SSH
connection to an SSH server. In the latter case, the device provides connections to
multiple clients.
Furthermore, SSH can also provide data compression to increase transmission
speed, take the place of Telnet or provide a secure "channel" for FTP.
c
CAUTION:
Currently, the Switch 4210 device supports only SSH2. when
functioning as either an SSH client or an SSH server. Unless otherwise noted, SSH
refers to SSH2 throughout this document.
Algorithm and Key
Algorithm is a set of transformation rules for encryption and decryption.
Information without being encrypted is known as plain text, while information
that is encrypted is known as cipher text. Encryption and decryption are performed
using a string of characters called a key, which controls the transformation
between plain text and cipher text, for example, changing the plain text into
cipher text or cipher text into plain text.
Figure 119
Encryption and decryption
Key-based algorithm is usually classified into symmetric key algorithm and
asymmetric key algorithm.
Asymmetric Key
Algorithm
Asymmetric key algorithm means that a key pair exists at both ends. The key pair
consists of a private key and a public key. The public key is effective for both ends,
Encryption
Key
Decryption
Cipher text
Plain text
Key
Plain text
Encryption
Key
Decryption
Cipher text
Plain text
Key
Plain text
Содержание 4210 PWR
Страница 10: ...Password Control Configuration 556 Displaying Password Control 563 Password Control Configuration Example 564...
Страница 22: ...20 CHAPTER 1 CLI CONFIGURATION...
Страница 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT...
Страница 84: ...82 CHAPTER 5 VLAN CONFIGURATION...
Страница 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION...
Страница 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION...
Страница 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION...
Страница 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT...
Страница 234: ...232 CHAPTER 17 802 1X CONFIGURATION...
Страница 246: ...244 CHAPTER 20 AAA OVERVIEW...
Страница 270: ...268 CHAPTER 21 AAA CONFIGURATION...
Страница 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION...
Страница 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION...
Страница 340: ...338 CHAPTER 30 CLUSTER...
Страница 362: ...360 CHAPTER 33 SNMP CONFIGURATION...
Страница 368: ...366 CHAPTER 34 RMON CONFIGURATION...
Страница 450: ...448 CHAPTER 39 TFTP CONFIGURATION...
Страница 451: ......
Страница 452: ...450 CHAPTER 39 TFTP CONFIGURATION...
Страница 470: ...468 CHAPTER 40 INFORMATION CENTER...
Страница 496: ...494 CHAPTER 44 DEVICE MANAGEMENT...