Introduction; The Ssh2 Solution; Fully Compliant With The Ssh Protocol Specification; Strong Authentication And Multiple Cipher Suites - HP NonStop SSH 544701-014 Reference Manual

Table of Contents

Advertisement

Introduction

The SSH2 Solution

SSH2 is a set of programs delivered when the customer purchases one of the following products:
HP NonStop SSH. HP NonStop SSH is a comprehensive, enterprise Secure Shell solution for HP NonStop
servers. In the fall of 2010, it became available from HP with the purchase of the NonStop Operating System
Kernel for H Series and J Series NonStop platforms. For G Series releases, HP NonStop SSH continues to be
available from HP as an RVU for which a license is required to obtain full functionality. For details on licensing
and availability, please contact your HP Sales representative.
comForte SecurSH. SecurSH is identical with HP NonStop SSH. It includes a remote shell and SFTP client and
a shell server with full pseudo terminal support. It also offers SFTP, TCP and FTP port forwarding capabilities.
The complete functionality is delivered by SSH2 programs.
comForte SecurFTP. SecurFTP provides secure file transfer for HP NonStop systems. To protect data
confidentiality across the network, it supports FTP session encryption, either via the SSL/TLS protocol
(SecurFTP/SSL) or via the SSH/SFTP protocol (SecurFTP/SSH). For SecurFTP/SSH, SSH2 delivers the SFTP
functionality, which is a subset of the comForte SecurSH functionality.

Fully Compliant with the SSH Protocol Specification

SSH2 is fully compliant with version 2 of the SSH (Secure Shell) protocol standard as described in various Internet draft
documents (see www.ietf.org). It can be integrated with any SSH solution on UNIX, Windows or other platforms.

Strong Authentication and Multiple Cipher Suites

SSH2 supports public key authentication with key sizes of up to 2048 bits. Various ciphers, including AES and 3DES,
and MACing algorithms can be selected.

Support of Full Screen Terminal Access

SSH2 supports pseudo terminals on the NonStop platform, allowing SSH clients to execute full screen applications, such
as Emacs or vi within Secure Shell.

Built-in User Base

A built-in user base allows administrators to flexibly control who can access a system. Remote users can logon with
virtual user names instead of a Guardian userid, eliminating the potential exposure of system credentials to file transfer
clients. Access can be limited to a part of the file system and to a specific set of operations (e.g. only download).
HP NonStop SSH Reference Manual
Introduction • 25

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents