Secure Shell Connection

The managed system must have an active SSH server to interface with Operations Sentinel through an SSH connection. Operations Sentinel uses SSH version 1 or version 2.

The SSH version 1 server must support at least one algorithm in each of the following categories:

The SSH version 2 server must support at least one algorithm in each of the following categories:

Because SSH is essentially a secured version of TELNET, all characteristics described in “Ping Monitoring” apply to the SSH connection. See Figure 4–1 for more information.

SSH Connection Considerations