SSH2 Protocol Features
The SSH2 protocol contains the following features:
- Secure terminal sessions utilizing secure encryption.
- Full, secure replacement for FTP and Telnet, as well as the UNIX r-series of commands:
rlogin
, rcp
, rexec
.
- Multiple high security algorithms and strong authentication methods that prevent such security threats as identity spoofing.
- Multiple ciphers for encryption, including e.g. 3DES, Blowfish and
the AES candidate TWOFISH.
- Both password and public key authentication.
- Transparent and automatic tunneling of X11 connections and arbitrary TCP/IP-based applications, such as e-mail.
- Automatic and secure authentication of both ends of connection. Both the server and the client are authenticated to prevent identity spoofing, Trojan horses, etc.
- Unique graphical secure file transfer interface (
SFTP
) fully integrated in the client software.
- Multiple channels that allow you to have multiple terminal windows and file transfers going through one secure and authenticated connection.
[Contents]
[Index]
[ Support | Feedback | SSH Home Page | SSH Products ]
Copyright © 2000 SSH Communications Security Corp
All rights reserved.