1. Trang chủ
  2. » Công Nghệ Thông Tin

implementing ssh - strategies for optimizing the secure shell

406 776 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 406
Dung lượng 6,91 MB

Nội dung

[...]... Configuration for VanDyke Software’s VShell SSH Server 214 215 217 217 217 220 222 Advantages to SSH Port Forwarding Summary Chapter 7 225 226 Secure Remote Access Secure E-mail with SSH 229 230 Setting Up the SSH Server Setting Up the SSH Client Setting Up the E-mail Client Executing Secure E-mail 232 232 234 237 Secure File Transfer (SMB and NFS) with SSH 238 Setting Up the SSH Server Setting Up the SSH Client... Basics of Port Forwarding for Clients Networking Basics of Port Forwarding for Servers SSH Port Forwarding Local Port Forwarding for SSH Clients 187 193 200 201 205 Configuration for Command-Line Clients Configuration for SSH Communications’ GUI SSH Client Configuration for VanDyke Software’s Secure CRT Configuration for PuTTY Remote Port Forwarding for SSH Clients Configuration for OpenSSH Client (Unix... Configuration for SSH Communications’ Command-Line Client (Unix and Windows) 205 207 209 211 213 213 214 Contents Configuration for SSH Communications’ GUI SSH Client (Windows) Configuration for VanDyke Software’s SecureCRT Port Forwarding for SSH Servers Configuration for OpenSSH Server (Unix and Windows) Configuration for SSH Communications’ SSH Server (Unix) Configuration for SSH Communications’ SSH Server... Setting Up the File Server Clients Executing Secure File Transfer Secure File Sharing with SMB and SSH Secure File Sharing with NFS and SSH 241 241 243 243 244 245 Secure Management with SSH Setting Up the SSH Server Setting Up the SSH Client Setting Up the Management Clients Executing Secure Management Secure Management with Windows Terminal Services and SSH Secure Management with VNC and SSH Secure Management... MacSSH Summary Chapter 4 110 112 113 116 116 Authentication General Options 117 118 SSH Communications’ SSH Server (Windows) SSH Communications’ SSH Server (Unix) VShell SSH Server OpenSSH (Unix and Windows) Passwords Host-Based Authentication Server Authentication Public Keys Creating Keys with OpehSSH How to Use an OpenSSH Key on an OpenSSH Server How to Use an OpenSSH Key on SSH Communications’ SSH. .. Transfer with Secure File Transfer Protocol (SFTP) SFTP with the OpenSSH SFTP Server Using OpenSSH for Management Purposes Using OpenSSH for File Sharing Authorizing Users with OpenSSH OpenSSH on Windows and Cygdrive SFTP with VanDyke Software VShell Using VShell for Management Purposes Using VShell for File Sharing Authorizing Users with VShell SFTP with SSH Communications’ SSH Server Using SSH Communications’... to skip to the next chapter Specifically, this chapter discusses the following topics: ■ ■ Differences between SSH1 and SSH2 ■ ■ Uses of SSH ■ ■ Client/server architecture for SSH ■ ■ SSH s Encryption Architecture ■ ■ Basic miscues with SSH ■ ■ Types of SSH clients/servers ■ ■ Basic setup of SSH ■ ■ Summary of SSH s optimal uses Differences between SSH1 and SSH2 SSH version 1 (SSH1 ) was the first iteration... Communications (Windows GUI) How to Upload an SSH Client Key Pair to SSH Communications’ SSH Server How to Upload an SSH Client Key Pair to an OpenSSH Server How to Upload an SSH Client Key Pair to a VShell SSH Server Creating Keys with VanDyke SecureCRT VShell SSH Server OpenSSH SSH Communications’ SSH Server SSH Agents 142 144 145 147 148 149 150 151 152 Summary Chapter 5 153 SSH Management Network Devices 155... security over the password and the username “kusum.” SSH provides the following three key security features: Encryption SSH encrypts all communication with a variety of cipher algorithms to choose from Two-factor authentication SSH can require a username/password or public key for authentication In addition, these two options can be used together for two-factor authentication Integrity SSH can create... standard defined by the IETF’s Secure Shell working group (www.ietf.org/html.charters/secsh-charter.html) In addition, SSH has many open source and commercial implementations for both SSH servers and SSH clients In this book we will discuss, reference, or describe the following implementations of SSH: ■ ■ OpenSSH (www.openssh.org) ■ ■ OpenSSH—Win32 (http://lexa.mckenna.edu/sshwindows/) ■ ■ SSH Communications . Dwivedi Implementing SSH ® Strategies for Optimizing the Secure Shell Implementing SSH ® Strategies for Optimizing the Secure Shell Himanshu Dwivedi Implementing SSH ® Strategies for Optimizing. 232 Setting Up the SSH Client 232 Setting Up the E-mail Client 234 Executing Secure E-mail 237 Secure File Transfer (SMB and NFS) with SSH 238 Setting Up the SSH Server 241 Setting Up the SSH Client. 215 Port Forwarding for SSH Servers 217 Configuration for OpenSSH Server (Unix and Windows) 217 Configuration for SSH Communications’ SSH Server (Unix) 217 Configuration for SSH Communications’ SSH

Ngày đăng: 25/03/2014, 11:44