A Secure Shell Connection (SSH) access provides an interface similar to TELNET within a highly secure protocol. With the SSH protocol, Operations Sentinel does not exchange passwords in clear text with the monitored system, and after the connection is established, all data exchanged is encrypted.
SSH protocol provides the following features:
Trusted machine authentication
Data encryption
Packet authentication
User authentication
These features ensure the following:
The monitored system connected to Operations Sentinel is in fact the correct system.
The user that established the connection is a trusted user.
The data exchanged cannot be read in clear text using a LAN sniffer.
The data arrives at its destination intact.
The monitored system must have an active SSH server able to support version 1 or version 2. As SSH is essentially a secured version of TELNET, anything you could do with an Operations Sentinel TELNET monitoring connection can also be done with an SSH connection.