S

Safe passage, 585
Scaling, BGP, 395–96
Secret keys, 593
Secure shell (SSH), 249, 633–57
in action, 649–55
agents, 640
architecture, 639–40
authentication, 636, 637–38
basics, 636–37
clients, 636, 639
as client–server protocol, 636
configuration files, 640
Ethereal capture, 655
features, 637–38
FTP and, 647
host key, 640
Illustrated Network, 634–35
key generator, 639
keys, 640–41
known hosts, 639
model illustration, 637
OpenSSH, 637
protocol operation, 641–42
protocol relationships, 641
proxy gateway, 638
random seeds, 640
as remote access application, 633
secure client–server communication, 637
security add-on, 638
servers, 639
session key, 640–41
sessions, 639
signer, 640
as slogin implementation, 636
SSH1 ...

Get The Illustrated Network now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.