Secure Shell Connection

A Secure Shell Connection (SSH) access provides an interface similar to TELNET within a highly secure protocol. With the SSH protocol, Operations Sentinel does not exchange passwords in clear text with the monitored system, and after the connection is established, all data exchanged is encrypted.

SSH protocol provides the following features:

These features ensure the following:

The monitored system must have an active SSH server able to support version 1 or version 2. As SSH is essentially a secured version of TELNET, anything you could do with an Operations Sentinel TELNET monitoring connection can also be done with an SSH connection.

Figure 9. TELNET or SSH Connection Method [UNIX, Other]

TELNET or SSH Connection Method [UNIX, Other]