"This tip describes how to set up SSH2 (Secure Shell) on Red Hat
Enterprise Linux (RHEL) and to use encryption keys instead of
passwords. This will enable the administrator to connect in a
quicker, easier and more secure manner. It is applicable to either
RHEL 4 or RHEL 5.
"There are currently two versions of the SSH protocol in use,
which are SSH1 and SSH2. The SSH1 protocol can be exploited through
its connection setup protocol and is, therefore, not commonly used
anymore. The SSH2 protocol however, has a more robust and more
flexible connection-setup. There are two enterprise-level versions
of SSH: one derived from ssh.com, and the other is OpenSSH. OpenSSH
is free and used more often. In fact, OpenSSH is included with most
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.