![]() Refer to Cisco Technical Tips Conventions for more information. SSH Version 2.0 (SSH v2) support was introduced in Cisco IOS platforms and images start in Cisco IOS Software Release 12.1(19)E. SSH terminal-line access (also known as reverse-Telnet) was introduced in Cisco IOS platforms and images start in Cisco IOS Software Release 12.2.2.T.SSH was introduced into these Cisco IOS platforms and images: The information in this document is based on Cisco IOS 3600 Software (C3640-IK9S-M), Release 12.2(2)T1. If your network is live, ensure that you understand the potential impact of any command. All of the devices used in this document started with a cleared (default) configuration. The information in this document was created from the devices in a specific lab environment. The Cisco IOS image used must be a k9(crypto) image in order to support SSH. The IETF's secsh (Secure Shell) Working Group was working on SSH and SSH2, but the drafts that were developed are no longer up on the Web site and no RFCs have come out of this group.Ĭopyright (c) 2001 Tom Sheldon and Big Sur Multimedia.Īll rights reserved under Pan American and International copyright conventions.This document describes how to configure and debug Secure Shell (SSH) on Cisco routers or switches that run Cisco IOS ® Software. Information about SSH2 is available at the company's Web site listed on the related entries page. According to SSH Communication Security, SSH1 should be replaced with SSH2 to achieve improved flexibility, better scalability to organizations with thousands of users, and better security. Thus, a remote user can connect to a corporate network and access e-mail, file servers, and other services. Multiple SSH connections can be cascaded so an authenticated user can make secure connections to multiple hosts on a network through the same tunnel. Smart cards and token-based authentication are also supported. Authentication and integrity is provided by passwords or public keys (DSA and RSA), or via Kerberos. ![]() SSH provides confidentiality through the support of encryption techniques such as DES, Triple-DES, IDEA, BlowFish, TwoFish, and CAST. SSH is available for Microsoft Windows, UNIX platforms, and other platforms. Other vendors, such as F-Secure and Van Dyke Corporation, implement SSH in their security products. The protocol was originally developed by Tatu Ylönen, who went on to start SSH Communications Security, now the primary supporter of SSH products. ![]() SSH can create secure remote X sessions for X Window System users. SSH provides the mechanisms that allow clients and servers to negotiate secure connections. It is designed to replace UNIX commands such as rlogin, rsh, and rcp, which have been found to be vulnerable to attacks. It also supports authenticated remote logon. SSH is a "secure shell," which means it provides encrypted "virtual" terminal (Telnet) and file transfer sessions. Note: Many topics at this site are reduced versions of the text in "The Encyclopedia of Networking and Telecommunications." Search results will not be as extensive as a search of the book's CD-ROM. Related Entries Web Links New/Updated Information ![]() Get info about the Encyclopedia of NetworkingĪnd Telecommunicatons, 3rd edition (2001)ĭownload the electronic version of the Encyclopedia
0 Comments
Leave a Reply. |