Operation Manual – SSHH3C S7500E Series Ethernet Switches Chapter 1 SSH Configuration1-1Chapter 1 SSH ConfigurationWhen configuring SSH, go to these sections for information you are interested in:z SSH Overviewz Configuring the Device as an SSH Serverz Configuring the Device as an SSH Clientz Displaying and Maintaining SSHz SSH Server Configuration Examplesz SSH Client Configuration Examples1.1 SSH OverviewSecure Shell (SSH) offers an approach to securely logging into a remote device. Byencryption and strong authentication, it protects devices against attacks such as IPspoofing and plain text password interception.The device can not only work as an SSH server to support connections with SSHclients, but also work as an SSH client to allow users to establish SSH connections witha remote device acting as the SSH server.Note:Currently, when acting as an SSH server, the device supports two SSH versions: SSH2and SSH1. When acting as an SSH client, the device supports SSH2 only.1.1.1 Algorithm and KeyAlgorithm is a set of transformation rules for encryption and decryption. Informationwithout being encrypted is known as plain text, while information that is encrypted isknown as cipher text. Encryption and decryption are performed using a string ofcharacters called a key, which controls the transformation between plain text and ciphertext, for example, changing the plain text into cipher text or cipher text into plain text.Figure 1-1 Encryption and decryption