3Com Switch 8800 Advanced Software V5 Configuration Guide
72
CONFIGURING SSH VERSION 2.0
When configuring SSH2.0, go to these sections for information you are interested
in:
■ “SSH2.0 Overview” on page 935
■ “Introduction to SSH Configuration Tasks” on page 940
■ “Configuring the SSH Server” on page 940
■ “Configuring the SSH Client” on page 945
■ “Configuring the Device as an SSH Client” on page 955
■ “Displaying and Maintaining SSH” on page 958
■ “SSH Server Configuration Examples” on page 959
■ “SSH Client Configuration Examples” on page 961
SSH2.0 Overview Secure shell (SSH) offers an approach to securely logging into a remote device. It
can protect devices against attacks such as IP spoofing and plain text password
interception.
The device can not only work as an SSH server to support connections with SSH
clients, but also work as an SSH client to allow users to establish SSH connections
with a remote device acting as the SSH server.
An SSH channel can be established through a local connection or WAN, as shown
in
Figure 278 and Figure 279.
Figure 278 Establish an SSH channel through local connection
SSH serverHost
Server Laptop SSH client
Ethernet