1-4z In password authentication, the client encrypts the username and password, encapsulates theminto a password authentication request, and sends the request to the server. Upon receiving therequest, the server decrypts the username and password, compares them with those it maintains,and then informs the client of the authentication result.z The publickey authentication method authenticates clients using digital signatures. Currently, thedevice supports two publickey algorithms to implement digital signatures: RSA and DSA. The clientsends to the server a publickey authentication request containing its user name, public key andalgorithm. The server verifies the public key. If the public key is invalid, the authentication fails;otherwise, the server generates a digital signature to authenticate the client, and then sends back amessage to inform the success or failure of the authentication.Session requestAfter passing authentication, the client sends a session request to the server, while the server listens toand processes the request from the client. If the client passes authentication, the server sends back tothe client an SSH_SMSG_SUCCESS packet and goes on to the interactive session stage with theclient. Otherwise, the server sends back to the client an SSH_SMSG_FAILURE packet, indicating thatthe processing fails or it cannot resolve the request. The client sends a session request to the server,which processes the request and establishes a session.Data exchangeIn this stage, the server and the client exchanges data in this way:z The client encrypts and sends the command to be executed to the server.z The server decrypts and executes the command, and then encrypts and sends the result to theclient.z The client decrypts and displays the result on the terminal.Configuring the SSH ServerYou must perform necessary configurations on the SSH server for SSH clients to access.