2-11 SSH2.0 ConfigurationWhen configuring SSH2.0, go to these sections for information you are interested in:z SSH2.0 Overviewz Configuring the Device as an SSH Serverz Configuring the Device as an SSH Clientz Displaying and Maintaining SSHz SSH Server Configuration Examplesz SSH Client Configuration ExamplesSSH2.0 OverviewIntroduction to SSH2.0Secure Shell (SSH) offers an approach to logging into a remote device securely. By encryption andstrong authentication, it protects devices against attacks such as IP spoofing and plain text passwordinterception.The device can not only work as an SSH server to support connections with SSH clients, but also workas an SSH client to allow users to establish SSH connections with a remote device acting as the SSHserver.Currently, when acting as an SSH server, the device supports two SSH versions: SSH2.0 and SSH1.When acting as an SSH client, the device supports SSH2.0 only.Operation of SSHThe session establishment and interaction between an SSH client and the SSH server involves thefollowing five stages:Table 1-1 Stages in session establishment and interaction between an SSH client and the serverStages DescriptionVersion negotiation SSH1 and SSH2.0 are supported. The two parties negotiate aversion to use.Key and algorithm negotiation SSH supports multiple algorithms. The two parties negotiate analgorithm for communication.Authentication The SSH server authenticates the client in response to the client’sauthentication request.