The document discusses configuring SSH on a remote switch for secure communication. It explains that SSH provides encryption of transmitted data between devices, unlike telnet which uses plain text. SSH allows two computers to communicate securely over an insecure network like the internet using strong password authentication and public key encryption. The document also mentions enabling secret class in SSH for password encryption based on md5 hashing.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
16 views4 pages
CN - Practical 10
The document discusses configuring SSH on a remote switch for secure communication. It explains that SSH provides encryption of transmitted data between devices, unlike telnet which uses plain text. SSH allows two computers to communicate securely over an insecure network like the internet using strong password authentication and public key encryption. The document also mentions enabling secret class in SSH for password encryption based on md5 hashing.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4
Name: Purav Ajmera Subject: Computer Networks
Class: Fy. Bsc- IT Date: 17/03/22 UID: 21BIT003
Practical 10: Configure SSH ➢ Telnet uses insecure plain text communication. SSH provides security for remote connections by providing string encryption of all transmitted data between devices. You will secure a remote switch with password encryption and SSH. • Stronger than Telnet • SSH stands for Secure Shell or Secure Socket Shell. It is a cryptographic network protocol that allows two computers to communicate and share the data over an insecure network such as the internet. It is used to replace unprotected remote login protocols such as Telnet, rlogin, rsh, etc., and insecure file transfer protocol FTP. • Secure communication provides a strong password authentication and encrypted communication with a public key over an insecure channel enable secret class - it will enable a password and password encryption that based on the md5 hashing algorithm. Name: Purav Ajmera Subject: Computer Networks Class: Fy. Bsc- IT Date: 17/03/22 UID: 21BIT003 Name: Purav Ajmera Subject: Computer Networks Class: Fy. Bsc- IT Date: 17/03/22 UID: 21BIT003 Name: Purav Ajmera Subject: Computer Networks Class: Fy. Bsc- IT Date: 17/03/22 UID: 21BIT003
Echo on a Chip - Secure Embedded Systems in Cryptography: A New Perception for the Next Generation of Micro-Controllers handling Encryption for Mobile Messaging