
Chapter 4 Centralized Configuration
Unlike Telnet or FTP, which transmit data in plaintext (clear or unencrypted text), SSH is a secure communication protocol that combines authentication and data encryption to provide secure encrypted communication between two hosts over an unsecured network. In the following figure, computer A on the Internet uses SSH to securely connect to the
"If the
Figure 11 SSH Communication Over the WAN Example
4.3 How SSH Works
The following table summarizes how a secure connection is established between two remote hosts.
Figure 12 How SSH Works
42 |
| |
| ||
|
|
|