Operation Manual – SSHH3C S5600 Series Ethernet Switches Chapter 1 SSH Configuration1-1Chapter 1 SSH ConfigurationNote:The DSA algorithm is newly added in SSH configuration. Click the following links forrelated information:z Generating/Destroying Key Pairsz Creating an SSH User and Specifying an Authentication Typez Configuring the Public Key of a Client on the ServerWhen configuring SSH, go to these sections for information you are interested:z SSH Overviewz SSH Server and Client Configuration Task Listz Displaying and Maintaining SSH Configurationz Comparison of SSH Commands with the Same Functionsz SSH Configuration Examples1.1 SSH Overview1.1.1 Introduction to SSHSecure Shell (SSH) is a protocol that provides secure remote login and other securityservices in insecure network environments. In an SSH connection, data are encryptedbefore being sent out and decrypted after they reach the destination. This preventsattacks such as plain text password interception. Besides, SSH also provides powerfuluser authentication functions that prevent attacks such as DNS and IP spoofing.SSH adopts the client-server model. The device can be configured as an SSH client oran SSH server. In the former case, the device establishes a remote SSH connection toan SSH server. In the latter case, the device provides connections to multiple clients.Furthermore, SSH can also provide data compression to increase transmission speed,take the place of Telnet or provide a secure “channel” for FTP.