
120
SSH2.0 configuration
SSH2.0 overview
Introduction to SSH2.0
Secure Shell (SSH) offers an approach to securely logging into a remote device. By encryption and
strong authentication, it protects devices against attacks such as IP spoofing and plain text
password interception.
The switch can not only work as an SSH server to support connections with SSH clients, but also
work as an SSH client to allow users to establish SSH connections with a remote device acting as
the SSH server.
Currently, when acting as an SSH server, the switch supports two SSH versions: SSH2.0 and SSH1. When
acting as an SSH client, the switch supports SSH2.0 only.
Operation of SSH
The session establishment and interaction between an SSH client and the SSH server involves the
following five stages:
Figure 36
Stages in session establishment and interaction between an SSH client and the server
Stages Description
SSH1 and SSH2.0 are supported. The two parties negotiate a version
to use.
SSH supports multiple algorithms. The two parties negotiate an
algorithm for communication.
The SSH server authenticates the client in response to the client’s
authentication request.
After passing authentication, the client sends a session request to the
server.
After the server grants the request, the client and server start to
communicate with each other.
Version negotiation
The server opens port 22 to listen to connection requests from clients.
1.
The client sends a TCP connection request to the server. After the TCP connection is
established, the server sends the first packet to the client, which includes a version
identification string in the format of “SSH-<primary protocol version number>.<secondary