3com WX3000 Manuel D’Utilisation
i
Table of Contents
1 SSH Configuration·····································································································································1-1
SSH Overview·········································································································································1-1
Introduction to SSH ·························································································································1-1
Algorithm and Key ···························································································································1-1
Asymmetric Key Algorithm ··············································································································1-2
SSH Operating Process ··················································································································1-2
Configuring the SSH Server····················································································································1-4
SSH Server Configuration Tasks ····································································································1-5
Configuring SSH Management········································································································1-8
Configuring the SSH Client ···················································································································1-12
SSH Client Configuration Tasks····································································································1-12
Displaying and Maintaining SSH Configuration ····················································································1-21
SSH Configuration Examples ···············································································································1-22
When the Device Acts as the SSH Server and the Authentication Type is Password ·················1-22