User guide

Initial Configuration 55
© 2012 Datacom Systems Inc
4.6.2 SSH
Secure Shell (SSH ) is a network protocol that uses public key cryptography that allows secure
network services to be exchanged over an insecure network between two networked devices. SSH
Secure Shell with its array of unmatched security features is an essential tool in today's network
environment. It is a powerful guardian against the numerous security hazards that nowadays threaten
network communications.
Several different versions of the Secure Shell client and server exist. Please note that the different
versions may use different implementations of the SSH protocol, and therefore you may not be able
to connect to an SSH1 server using SSH2 client software, or vice versa.
Restrictions for Secure Shell Version 2 Support:
Execution Shell and remote command execution are the only applications supported.
Compression is not supported.
The following instructions illustrate a "typical" PuTTY SSH client configuration. This example was
prepared using PuTTY version 0.60. PuTTY.
Step 1. When you start PuTTY, you see the dialog box that allows you to control everything
PuTTY can do. You don't need to change most of the configuration options. To start the simplest
kind of session, all you need to do is to enter a few basic parameters.