What is secure (SSH)?

This is a recommends products dialog
Top Suggestions
Starting at
View All >
Language
French
English
ไทย
German
繁體中文
Country
Hi
All
Sign In / Create Account
language Selector,${0} is Selected
Register & Shop at Lenovo Pro
Register at Education Store
Pro Tier Benefits
• Save up to an extra 20% on Think everyday pricing.
• Spend $15K, advance for FREE to Plus Tier with increased benefits.
Plus Tier Benefits
• Save up to an extra 25% on Think everyday pricing.
• Spend $50K, advance for FREE to Elite Tier with increased benefits.
Elite Tier Benefits
• Save up to an extra 30% on Think everyday pricing.
Reseller Benefits
• Access to Lenovo's full product portfolio
• Configure and Purchase at prices better than Lenovo.com
View All Details >
more to reach
PRO Plus
PRO Elite
Congratulations, you have reached Elite Status!
Pro for Business
Delete icon Remove icon Add icon Reload icon
TEMPORARILY UNAVAILABLE
DISCONTINUED
Temporary Unavailable
Cooming Soon!
. Additional units will be charged at the non-eCoupon price. Purchase additional now
We're sorry, the maximum quantity you are able to buy at this amazing eCoupon price is
Sign in or Create an Account to Save Your Cart!
Sign in or Create an Account to Join Rewards
View Cart
Your cart is empty! Don’t miss out on the latest products and savings — find your next favorite laptop, PC, or accessory today.
Remove
item(s) in cart
Some items in your cart are no longer available. Please visit cart for more details.
has been deleted
Please review your cart as items have changed.
of
Contains Add-ons
Subtotal
Proceed to Checkout
Yes
No
Popular Searches
What are you looking for today ?
Trending
Recent Searches
Hamburger Menu
{"backgroundColor":"#e6f4fa","sideMsg":"","data":[{"bannerInfo":{"t_id":"Page1ff6ee29-6ab8-4901-b7c9-3b7b18fd7449","language":{"en_nz":"%3Cp%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3ENeed%20Help%3F%26nbsp%3B%3C%2Fspan%3E%3Ca%20target%3D%22_self%22%20href%3D%22tel%3A0800%20446%20833%20Option%20%232%22%20style%3D%22text-wrap%3A%20wrap%3B%20color%3A%20rgb(41%2C%2078%2C%20149)%3B%22%3ECall%20us%20on%200800%20446%20833%20Option%20%232%3C%2Fa%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%26nbsp%3Bor%26nbsp%3B%3C%2Fspan%3E%3Ca%20target%3D%22_self%22%20href%3D%22https%3A%2F%2Finside.chat%2FLenovoNZ%22%20style%3D%22text-wrap%3A%20wrap%3B%20color%3A%20rgb(41%2C%2078%2C%20149)%3B%22%3Echat%20with%20us%3C%2Fa%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%26nbsp%3Bfor%20order%20related%20help%20and%20access%20to%20special%20deals!%3C%2Fspan%3E%3C%2Fp%3E","en":""},"id":"Page1ff6ee29-6ab8-4901-b7c9-3b7b18fd7449"}},{"pcInfo":"","mAndTabInfo":"","bannerInfo":{"t_id":"Pagee96d377d-d2ee-4534-a46c-efd41e80772e","language":{"en_nz":"%3Cp%3E%3Cimg%20src%3D%22https%3A%2F%2Fp3-ofp.static.pub%2Ffes%2Fcms%2F2022%2F09%2F20%2Fsgy8gw8u4tymopd8g2224x0drocvbb133978.png%22%20alt%3D%22zip-logo%22%20style%3D%22text-wrap%3A%20wrap%3B%22%2F%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%26nbsp%3BWanting%20to%20use%20ZIP%3F%20Chat%20with%20us%20or%20call%20us%20on%200800%20446%20833%20option%232%3C%2Fspan%3E%3C%2Fp%3E","en":""},"id":"Pagee96d377d-d2ee-4534-a46c-efd41e80772e"},"gInfo":""},{"pcInfo":"","mAndTabInfo":"","bannerInfo":{"t_id":"Pagee04d57b5-c8f6-4eab-ae95-882fa6f2a7ea","language":{"en_nz":"%3Cp%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%3C%2Fspan%3E%3Cstrong%3ELenovo%20Education%3C%2Fstrong%3E%20%7C%20Register%20to%20unlock%20savings%20%26amp%3B%20benefits%20on%20study-friendly%20PCs%20and%20accessories.%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%3C%2Fspan%3E%3C%2Fspan%3E%3Cbr%20style%3D%22text-wrap%3A%20wrap%3B%22%2F%3E%3Ca%20href%3D%22https%3A%2F%2Fwww.lenovo.com%2Fnz%2Fedu%2Fnzeducation%2Fen%2Flogin%2Fanzedu%2F%22%20target%3D%22_blank%22%20title%3D%22SIGN%20UP%20OR%20LOG%20IN%22%20style%3D%22text-wrap%3A%20wrap%3B%20color%3A%20rgb(41%2C%2078%2C%20149)%3B%22%3EJoin%20Lenovo%20Edu%3C%2Fa%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%26nbsp%3B%7C%3C%2Fspan%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%26nbsp%3B%3C%2Fspan%3E%3Ca%20href%3D%22https%3A%2F%2Fwww.lenovo.com%2Fnz%2Fen%2Flenovo-edu%2Fstudent%2Fbenefits%2F%22%20target%3D%22_blank%22%20title%3D%22SIGN%20UP%20OR%20LOG%20IN%22%20style%3D%22text-wrap%3A%20wrap%3B%20color%3A%20rgb(41%2C%2078%2C%20149)%3B%22%3EAbout%20Edu%3C%2Fa%3E%3C%2Fp%3E","en":""},"id":"Pagee04d57b5-c8f6-4eab-ae95-882fa6f2a7ea"},"gInfo":""},{"pcInfo":"","mAndTabInfo":"","bannerInfo":{"t_id":"Page9229a0ca-154b-48a2-bafe-18b30a80f9c1","language":{"en_nz":"%3Cp%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%3Cstrong%3EClearance%20Sale%3C%2Fstrong%3E%26nbsp%3B%7C%20%26nbsp%3BLast%20chance%20to%20save%20BIG%20on%20selected%20PCs%2C%20monitors%20and%20accessories.%3C%2Fspan%3E%3Cbr%20style%3D%22text-wrap%3A%20wrap%3B%22%2F%3E%3Ca%20href%3D%22https%3A%2F%2Fwww.lenovo.com%2Fnz%2Fen%2Fd%2Fdeals%2Fclearance-sale%2F%3FipromoID%3Dnz_hello_bar_clearance%22%20target%3D%22_blank%22%20title%3D%22SIGN%20UP%20OR%20LOG%20IN%22%20style%3D%22text-wrap%3A%20wrap%3B%20color%3A%20rgb(41%2C%2078%2C%20149)%3B%22%3EShop%20Deals%3C%2Fa%3E%3C%2Fp%3E","en":""},"id":"Page9229a0ca-154b-48a2-bafe-18b30a80f9c1"},"gInfo":""}],"autoRun":true,"displayTerminal":"pc,tablet,mobile"}
Learn More      


What is secure (SSH)?

SSH is a cryptographic network protocol that allows you to securely access and manage network devices and servers over an unsecured network. It provides a secure channel for data communication, offering encryption and authentication to protect against unauthorized access.

How does SSH work?

SSH works by establishing a secure connection between a client and a server. It uses encryption algorithms to secure data transmission and authentication methods to verify the identity of users. The communication between the client and server is encrypted, preventing eavesdropping and ensuring the confidentiality and integrity of the data being transmitted.

What are the key components of SSH?

SSH consists of two main components: the client and the server. The client initiates the connection and sends requests, while the server responds to those requests. Key pairs, including public and private keys, play a crucial role in SSH. The public key is shared with the server, while the private key is kept secure on the client side for authentication purposes.

How does key-based authentication work in SSH?

Key-based authentication in SSH involves using a pair of cryptographic keys: a public key and a private key. The public key is placed on the server, and the private key is kept on the client. When you attempt to connect, the server checks your public key against its authorized keys, and if there's a match, the server allows access. It's a highly secure method, eliminating the need for passwords.

What are the advantages of using SSH over other protocols?

SSH offers several advantages. Firstly, it encrypts data, ensuring the confidentiality of sensitive information. Secondly, it provides secure authentication, reducing the risk of unauthorized access. Additionally, SSH is versatile, supporting various protocols and allowing secure file transfers, remote command execution, and tunneling for other applications.

What does port forwarding means in SSH?

Port forwarding, also known as SSH tunneling, allows you to securely access services on a remote server as if they were on your local machine. It's like creating a secure pathway between your local and remote systems. This feature is handy for accessing resources that might be restricted or for securely connecting to services like databases running on remote servers.

How can I use SSH for secure file transfer?

You can use the secure copy protocol (SCP) or the secure file transfer protocol (SFTP) for secure file transfers over SSH. SCP allows you to copy files between your local and remote machines securely, while SFTP provides a more feature-rich environment for managing files on the remote server.

What is the significance of known_hosts in SSH?

The known_hosts file is crucial for SSH security. It stores the host keys of remote servers you've connected to previously. When you connect to a server, SSH checks its host key against the one stored in your known_hosts file. If they match, it confirms the server's identity. If not, SSH warns you about a potential security risk, preventing man-in-the-middle attacks.

How can I change the default SSH port for added security?

Changing the default SSH port from 22 to a custom port adds an extra layer of security by making it less predictable for attackers. You can modify the SSH daemon configuration file, usually located at /etc/ssh/sshd_config, and specify a different port. Ensure the chosen port is not used by other services and remember to update your firewall settings accordingly.

What is the concept of tunneling in SSH?

Tunneling in SSH, also known as port forwarding, allows you to create a secure connection between two devices through an encrypted channel. This can be useful for accessing services on a remote server securely or bypassing restrictions. Local port forwarding lets you access a remote service on your local machine, while remote port forwarding allows the opposite, making a local service accessible remotely.

How can I generate SSH key pairs?

Generating SSH key pairs involves using the ssh-keygen command. Open your terminal and type "ssh-keygen." You'll be prompted to choose a location for the keys and, optionally, set a passphrase for added security. Once generated, you'll have a public key (usually ending in .pub) and a private key. Remember to keep the private key secure and share the public key with servers you want to access.

What is the purpose of SSH-agent?

SSH-agent is a program that holds private keys used for public key authentication. It helps manage your keys securely, allowing you to add and remove keys without exposing them to potential attackers. By using SSH-agent, you can avoid entering your passphrase every time you use your private key, streamlining the authentication process.

How can I disable password authentication in SSH?

To enhance security, you can disable password authentication in SSH and rely solely on key-based authentication. Edit the sshd_config file and set "PasswordAuthentication" to "no." After making the change, restart the SSH service. This ensures that only clients with the correct private key can access the server, eliminating the risk of password-based attacks.

Can SSH be used for remote command execution?

SSH allows you to execute commands on a remote server securely. By using the ssh command with the appropriate options, you can connect to a remote server and run commands as if you were physically present. This feature is invaluable for remote administration and automation tasks.

How can I troubleshoot SSH connection issues?

If you're experiencing SSH connection problems, there are several steps you can take. Check your network connection, ensure the server is running, and verify that you have the correct credentials. Examining the SSH logs on both the client and server sides can provide valuable information. Additionally, confirming firewall settings and checking for any changes in the server's configuration can help resolve connectivity issues.

What security measures should I take to protect my SSH server?

Securing your SSH server is crucial. Besides using key-based authentication and disabling password authentication, you can implement measures like limiting user access, regularly updating SSH software, and monitoring for suspicious activity. It's also advisable to configure your firewall to allow only necessary traffic and keep your system and SSH software up to date with the latest security patches.

Can I use SSH on Windows?

Yes, you can use SSH on Windows. You can either use the built-in OpenSSH client that comes with Windows 10 or install SSH clients like PuTTY. With the increasing support for SSH on various platforms, including Windows, you can seamlessly connect to remote servers and devices, regardless of the operating system.

How does SSH contribute to network security?

SSH plays a significant role in network security by providing a secure method for remote access and data transfer. Its encryption and authentication mechanisms protect sensitive information from eavesdropping and unauthorized access. By creating secure tunnels and facilitating secure file transfers, SSH enhances the overall security posture of networks, making it an essential tool for administrators and developers.

{"pageComponentDataId":"8be139aba72e3-4860-99ca-6ba970e0d706","isAssociatedRelease":"true","pageComponentDataLangCode":"en_au","configData":{"jumpType":"currentTab","headlineColor":"black","displayNumber":"","styleMode":"vertical","miniCardHoMode":"2","headline":"","products":[{"number":{"t_id":"21kccto1wwnz5","language":{"en_nz":"21kccto1wwnz5","en_au":"21kccto1wwau5","en":""},"id":"Page4260753e-143c-43ae-bd9b-84ae5d0f0dec"}},{"number":{"t_id":"21mccto1wwnz3","language":{"en_nz":"21mccto1wwnz3","en_au":"21mccto1wwau3","en":""},"id":"Page6638705e-acca-4f80-8b27-2e84f2716f0f"}},{"number":{"t_id":"21lkcto1wwnz3","language":{"en_nz":"21lkcto1wwnz3","en_au":"21lkcto1wwau3","en":""},"id":"Page760db0cd-85b7-4d63-b8d8-e3bb500322b5"}},{"number":{"t_id":"21g2cto1wwnz3","language":{"en_nz":"21g2cto1wwnz3","en_au":"21g2cto1wwau3","en":""},"id":"Pagee12208cf-23fd-418f-9456-aae9d4ad753c"}}]},"urlPrefix":"AAAAAAAHAAAB","title":"glossary-right-blue-boxes-fragment","pageId":"e462edae-186e-4421-8743-19efc53941fa","urlEdit":0,"uri":"/FragmentDirectory/glossary/glossary-right-blue-boxes-fragment.frag","pageComponentId":"e857fdeft7e51-4b61-84dc-bccec6e68e00","tplId":"65b55929-de05-417a-a92a-ccb888d329b0","pageComponentUuid":"e857fdeft7e51-4b61-84dc-bccec6e68e00","targetUser":"0"}
coming coming
Starting at
List Price
Web Price
Web Price:
List Price
Web Price
List Price is Lenovo’s estimate of product value based on the industry data, including the prices at which first and third-party retailers and etailers have offered or valued the same or comparable products. Third-party reseller data may not be based on actual sales.
Web Price is Lenovo’s estimate of product value based on industry data, including the prices at which Lenovo and/or third-party retailers and e-tailers have offered or valued the same or comparable products. Third-party data may not be based on actual sales.
Learn More
See More
See Less
View {0} Model
View {0} Models
Part Number:
Features
See More
See Less
compare
Added!
Great choice!
You may compare up to 4 products per product category (laptops, desktops, etc). Please de-select one to add another.
View Your Comparisons
Add To Cart
Add To Cart
We're sorry,
Products are temporarily unavailable.
Continue shopping
Learn More
Coming Soon
Featured Product
Best Deals of the Day
Oops! No results found. Visit the categories above to find your product.
Save
open in new tab
© 2024 Lenovo. All rights reserved.
© {year} Lenovo. All rights reserved.
Compare  ()
removeAll x