Compex Systems WPE53G User Manual

Page 73

Advertising
background image

Page 67

Access the Secure Shell Host Command
Line Interface

SSH provides the best remote access security using different forms of
encryption and ciphers to encrypt sessions, and providing better
authentication facilities and features that increase the security of other
protocols.


An encrypted connection like SSH is not viewable on the network. The server
can still read the information, but only after negotiating the encrypted session
with the client.


SSH CLI has a command line interface.

Advertising