Join Greg Sowell for an in-depth discussion in this video SSH, part of Networking Foundations: Protocols and CLI Tools.
- [Voiceover] Secure Shell is a protocol…to allow encrypted remote console access…over a network.…This is most closely associated with connecting…to a Linux server, router, or switch for configuration.…It uses TCP port 22 for reliable delivery of packets.…Though it is most closely associated with Linux servers,…Microsoft announced in 2015 that, moving forward,…Windows Server will have native support for SSH.…It was originally designed to be a secure replacement…for plain text methods like Telnet.…
SSH uses public key cryptography…via a certificate to verify remote computers.…A public or private certificate can be generated…and installed, or, as in most cases, the server…will just generate its own certificate.…Authentication of user names is often done…via accounts on the server being logged into,…or via a centralized authentication system…for better control.…Beyond remote access,…SSH has additional features.…It supports tunneling which allows you…to securely send traffic over an SSH session.…
An admin can securely transfer files…
Protocols are the lifeblood of modern communication. By the end of this course, you'll know what you need to troubleshoot any network connection and keep the communication flowing.
Note: This course maps to domain 3 of the MTA Networking Fundamentals exam.
- Identify reasons why connectionless transmissions are faster.
- Determine what type of attack a gratuitous ARP announcing itself as a legitimate host indicates.
- State what IGMP snooping is useful for.
- Describe the best approach to use FTP to view and rename files on a server when your client is behind a firewall.
- Assess whether SSH is natively supported on Windows or not.
- List good uses for the arp command.