GS1920v2 Series User’s Guide
359
57.5  Technical Reference
This section provides technical background information on the topics discussed in this chapter.
57.5.1  SSH Overview
Unlike Telnet or FTP, which transmit data in clear text, SSH (Secure Shell) is a secure communication 
protocol that combines authentication and data encryption to provide secure encrypted 
communication between two hosts over an unsecured network.
Figure 260   SSH Communication Example
57.5.1.1  How SSH Works
The following table summarizes how a secure connection is established between two remote hosts.
Display
AAA Select which specific information to display in plain text, in the saved configuration file.
• Authentication
• Authorization
•Server
User Select which user account information to display in plain text, in the saved configuration file.
•System
•SNMP
Apply Click Apply to save your changes for Display to the Switch’s run-time memory. The Switch loses 
these changes if it is turned off or loses power, so use the Save link on the top navigation panel to 
save your changes to the non-volatile memory when you are done configuring.
Cancel Click Cancel to begin configuring Display afresh.
Table 202   SECURITY > Access Control > Account Security (continued)
LABEL DESCRIPTION