SSH2 Protocol Features
The ssh2 protocol contains the following features:
- Secure terminal sessions utilizing secure encryption.
- Full, secure replacement for FTP and Telnet, as
well as the UNIX r-series of commands:
rlogin
,
rsh
, rcp
, rexec
.
- Multiple high security algorithms and strong authentication methods that prevent such security threats as identity spoofing and man-in-the-middle attacks.
- Multiple ciphers for encryption, including e.g. 3DES, Blowfish and AES.
- Password, public key, certificate, smart card, PAM and SecurID
authentication methods.
- Transparent and automatic tunneling of X11 connections and arbitrary TCP/IP-based applications, such as e-mail.
- Automatic and secure authentication of both ends of connection. Both the server and the client are authenticated to prevent identity spoofing, Trojan horses, etc.
- Unique secure file transfer interface (
SFTP
) fully integrated in the client software.
- Multiple channels that allow you to have multiple terminal windows and file transfers going through one secure and authenticated connection.
[Contents]
[Index]
[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]
Copyright © 2001 SSH Communications Security Corp
All rights reserved.
Copyright Notice