Description
This indicates the detection of the SSH traffic.Secure Shell (SSH) is a cryptographic network protocol for secure remote login and network services over an insecure network. It is most commonly used for remote login to computer systems by users. The SSH client uses key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm to connect to a SSH server.
Affected Products
SSH
Impact
Unexpected network communication
Technology
Browser-Based, Network-Protocol, Client-Server, Peer-to-Peer, Cloud-Based, Mobile-Device
Behavior
- Reasonable
Default Ports
- TCP/22
Version Updates
Date | Version | Detail |
---|---|---|
2020-09-17 | 16.925 | Sig Added |