Is this content helpful?
secure shell
The SSH protocol is used to protect communication between two hosts by encrypting a Telnet, FTP, or SCP connection between the NEs. Both ends of the connection are authenticated, and passwords are encrypted.