
Once a client initiates a connection, the SSH daemon will respond with the software and the protocol versions it supports and the two will exchange their identification data. On the server’s side, there is a component called an SSH daemon that is constantly listening to a specific TCP/IP port for possible client connection requests. The client uses the provided remote host information to initiate the connection and if the credentials are verified, establishes the encrypted connection. An SSH client is an application you install on the computer which you will use to connect to another computer or a server. In order to establish an SSH connection, you need two components: a client and the corresponding server-side component. System and network administrators use this protocol the most, as well as anyone who needs to manage a computer remotely in a highly secure manner. When a secure SSH connection is established, a shell session will be started, and you will be able to manipulate the server by typing commands within the client on your local computer. Secure Shell, sometimes referred to as Secure Socket Shell, is a protocol which allows you to connect securely to a remote computer or a server by using a text-based interface. Firewall settings need to allow the remote connection.You need to have the necessary permissions to access the remote computer.You need the IP address or the name of the remote machine you want to connect to.The client and server applications need to be installed and enabled.

The remote computer must be turned on at all times and have a network connection.

Before you can establish a secure remote desktop protocol with a remote machine, there are a few basic requirements to meet:
