SSH Communications Security
Index
SSH Home page
Previous Next Up [Contents] [Index]

    Introduction >>
        Network Security Risks >>
        Different SSH Versions
        SSH2 Protocol Features
        New Features
        System Requirements
        Desktop Icons
        Support
    Configuration >>
    Connecting >>
    Terminal Window >>
    File Transfer >>
    Toolbar Reference >>
    Menu Reference >>
    Advanced Information >>
    Troubleshooting >>
    Appendices >>

SSH2 Protocol Features

The ssh2 protocol contains the following features:

  • Secure terminal sessions utilizing secure encryption.
  • Full, secure replacement for FTP and Telnet, as well as the UNIX r-series of commands: rlogin, rsh, rcp, rexec.
  • Multiple high security algorithms and strong authentication methods that prevent such security threats as identity spoofing and man-in-the-middle attacks.
  • Multiple ciphers for encryption, including e.g. 3DES, Blowfish and AES.
  • Password, public key, certificate, smart card, PAM and SecurID authentication methods.
  • Transparent and automatic tunneling of X11 connections and arbitrary TCP/IP-based applications, such as e-mail.
  • Automatic and secure authentication of both ends of connection. Both the server and the client are authenticated to prevent identity spoofing, Trojan horses, etc.
  • Unique secure file transfer interface (SFTP) fully integrated in the client software.
  • Multiple channels that allow you to have multiple terminal windows and file transfers going through one secure and authenticated connection.

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2001 SSH Communications Security Corp
All rights reserved.
Copyright Notice