3com 8807 ユーザーガイド
67
SSH T
ERMINAL
S
ERVICE
SSH Terminal Service
SSH Overview
This chapter introduces the secure shell (SSH) feature. When a user telnets to the
switch from an insecure network, the SSH feature can provide secure information
and powerful authentication functionality, thereby protecting the switch from
attacks such as IP address spoofing and clear text password interception attacks.
switch from an insecure network, the SSH feature can provide secure information
and powerful authentication functionality, thereby protecting the switch from
attacks such as IP address spoofing and clear text password interception attacks.
The switch can act as either SSH server or SSH client. When used as an SSH server,
the switch supports multiple connections with SSH clients; when used as an SSH
client, the switch supports SSH connections with the SSH server-enabled switch,
UNIX hosts, and so on.
the switch supports multiple connections with SSH clients; when used as an SSH
client, the switch supports SSH connections with the SSH server-enabled switch,
UNIX hosts, and so on.
Currently, the switch supports SSH 2.0.
Figure 180 and Figure 181 illustrate two methods for establishing an SSH channel
between a client and the server:
between a client and the server:
■
Connect through a LAN
■
Connect through a WAN
Figure 180 Establish an SSH channel through a LAN
100BASE -TX
Server
SSH client
Ethernet
Workstation
Laptop
SSH server
100BASE -TX
Server
PC
SSH
Ethernet
Workstation
Laptop
Switch
SSH