
Table 56 | Access Control: Logins (continued) | |
|
|
|
LABEL |
| DESCRIPTION |
|
|
|
Apply |
| Click Apply to save your changes to the switch’s |
|
| loses these changes if it is turned off or loses power, so use the Save link on the |
|
| top navigation panel to save your changes to the |
|
| are done configuring. |
Cancel |
| Click Cancel to reset the fields. |
|
|
|
24.5 SSH Overview
Unlike Telnet or FTP, which transmit data in clear text, SSH (Secure Shell) is a secure communication protocol that combines authentication and data encryption to provide secure encrypted communication
between two hosts over an unsecured network.
Figure 85 SSH Communication Example
24.6 How SSH works
The following table summarizes how a secure connection is established between two remote hosts.
182 | Chapter 24 Access Control |