Help, anyone help me to manage the ssh protocol.
SSH is organized as three protocols that typically run on top of Transmission Control Protocol:
1. Transport Layer Protocol -provides server authentication, data confidentiality, and data integrity with forward secrecy (that is, if a key is compromised during one session, the knowledge does not affect the security of earlier sessions); the transport layer may optionally provide compression
2. User Authentication Protocol -authenticates the user to the server
3. Connection Protocol -multiplexes multiple logical communications channels over a single underlying SSH connection
Protocols are descriptions of how the SSH operates to provide a particular service. They are not managed. Though you can manage keys, that would be a different thing to discuss.