Figure 10: Overview of the SSH protocol
By using a combination of host, server, and session keys, the SSH protocol provides strong
authentication and secure communication over an unsecure network, offering protection from
the following security risks:
• IP spoofing
• IP source routing
• DNS spoofing
• man-in-the-middle and TCP hijacking attacks
• eavesdropping and password sniffing
Even if network security is compromised, traffic cannot be played back or decrypted, and the
connection cannot be hijacked.
The secure channel of communication provided by SSH does not provide protection against
break-in attempts or denial-of-service (DoS) attacks.
The SSH protocol supports the following security features:
• Authentication: identifies the SSH client. During logon, the SSH client is queried for a
digital proof of identity.
Supported authentications are RSA (SSH-1), DSA (SSH-2), and passwords (both SSH-1
and SSH-2).
• Encryption: scrambles data rendering it unintelligible except to the receiver.
Supported encryptions are AES and 3DES.
• Integrity: guarantees that the data is transmitted from the sender to the receiver without
alteration. If any third party captures and modifies the traffic, the SSH server detects this
alteration.
Secure Shell
Configuration — IPv6 Routing
November 2010 55
Содержание ERS 8600 series
Страница 1: ...Configuration IPv6 Routing Avaya Ethernet Routing Switch 8800 8600 7 0 NN46205 504 03 03 November 2010...
Страница 14: ...New in this release 14 Configuration IPv6 Routing November 2010...
Страница 78: ...IPv6 routing configuration 78 Configuration IPv6 Routing November 2010...
Страница 132: ...Basic IPv6 configuration using the ACLI 132 Configuration IPv6 Routing November 2010...
Страница 176: ...IPv6 routing configuration using the CLI 176 Configuration IPv6 Routing November 2010...
Страница 194: ...IPv6 routing configuration using the ACLI 194 Configuration IPv6 Routing November 2010...
Страница 198: ...IPv6 DHCP Relay configuration using Enterprise Device Manager 198 Configuration IPv6 Routing November 2010...
Страница 206: ...IPv6 DHCP Relay configuration using the CLI 206 Configuration IPv6 Routing November 2010...
Страница 224: ...IPv6 VRRP configuration using Enterprise Device Manager 224 Configuration IPv6 Routing November 2010...
Страница 238: ...IPv6 VRRP configuration using the CLI 238 Configuration IPv6 Routing November 2010...
Страница 250: ...IPv6 VRRP configuration using the ACLI 250 Configuration IPv6 Routing November 2010...
Страница 262: ...IPv6 RSMLT configuration using the CLI 262 Configuration IPv6 Routing November 2010...
Страница 268: ...IPv6 RSMLT configuration using the ACLI 268 Configuration IPv6 Routing November 2010...
Страница 292: ...Multicast protocol configuration using Enterprise Device Manager 292 Configuration IPv6 Routing November 2010...
Страница 306: ...Multicast protocol configuration using the ACLI 306 Configuration IPv6 Routing November 2010...
Страница 344: ...IPv6 traffic filter configuration using the ACLI 344 Configuration IPv6 Routing November 2010...
Страница 398: ...CLI show commands 398 Configuration IPv6 Routing November 2010...