SSH
Secure Shell or SSH is a secure method for remote access as it includes authentication and encryption. To do this, it uses an RSA public/private keypair. SSH uses TCP port 22.
SSH provides a command-line interface to remote systems from which CLI commands can be input. Typical devices to which you can connect are Cisco routers, switches, and firewalls running some version of IOS, NX-OS, or ASA operating system for example, or a Linux-based server, to name only a few.
SSH is also used as a connection method for network automation tools such as Ansible for example.
There are two versions of SSH: version 1 and 2. Version 2 is more secure and commonly used.
SSH is preferable to Telnet which provides similar CLI access but without the level of security and confidentiality of SSH.
Links:
https://networklessons.com/cisco/ccna-200-301/configure-ssh-cisco-ios
Links to this page:
- Automation - Ansible connection plugins
- Best practice - prevent connectivity loss of remote device
- CoPP - Best practices and operation
- ICMP - Mitigating Vulnerabilities
- IP routing table - 'L' and 'C' entries
- MPP vs ACLs
- Management Plane Policing (MPP)
- NBAR classifies only established sessions
- Network planes
- Python - Performing Tasks Concurrently
- Python Paramiko SSH
- SSH - domain-name prerequisite
- Security - IOS Usernames and Passwords
- Security - accessing VTY from another VRF
- Syslog - terminal monitor
- Telnet