H3c-technologies H3C WX6000 Series Access Controllers Uživatelský manuál Strana 606

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 678
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 605
64-1
64 SSH Configuration
When configuring SSH, go to these sections for information you are interested in:
z SSH2.0 Overview
z Configuring the Device as an SSH Server
z Configuring the Device as an SSH Client
z Displaying and Maintaining SSH
z SSH Server Configuration Examples
z SSH Client Configuration Examples
The term switch in this document refers to a switch in a generic sense or an access controller
configured with the switching function unless otherwise specified.
SSH2.0 Overview
Secure Shell (SSH) offers an approach to securely logging into a remote device. By encryption and
strong authentication, it protects devices against attacks such as IP spoofing and plain text password
interception.
The device can not only work as an SSH server to support connections with SSH clients, but also work
as an SSH client to allow users to establish SSH connections with a remote device acting as the SSH
server.
Currently, when acting as an SSH server, the device supports two SSH versions: SSH2 and SSH1.
When acting as an SSH client, the device supports SSH2 only.
Algorithm and Key
Algorithm is a set of transformation rules for encryption and decryption. Information without being
encrypted is known as plain text, while information that is encrypted is known as cipher text. Encryption
and decryption are performed using a string of characters called a key, which controls the
transformation between plain text and cipher text, for example, changing the plain text into cipher text or
cipher text into plain text.
Zobrazit stránku 605
1 2 ... 601 602 603 604 605 606 607 608 609 610 611 ... 677 678

Komentáře k této Příručce

Žádné komentáře