Overview Of Secure Shell (Ssh); In This Chapter; Ssh Version 2 Support - Dell PowerConnect B-RX Configuration Manual

Bigiron rx series configuration guide v02.7.02
Hide thumbs Also See for PowerConnect B-RX:
Table of Contents

Advertisement

Configuring Secure Shell

In this chapter

Overview of Secure Shell (SSH)

Secure Shell (SSH) is a mechanism for allowing secure remote access to management functions on
a BigIron RX. SSH provides a function similar to Telnet. Users can log into and configure the device
using a publicly or commercially available SSH client program, just as they can with Telnet.
However, unlike Telnet, which provides no security, SSH provides a secure, encrypted connection to
the device.
SSH v2 is supported on the device. Brocade's SSHv2 implementation is compatible with all
versions of the SSHv2 protocol (2.1, 2.2, and so on). At the beginning of an SSH session, the device
negotiates the version of SSHv2 to be used. The highest version of SSHv2 supported by both the
device and the client is the version that is used for the session. Once the SSHv2 version is
negotiated, the encryption algorithm with the highest security ranking is selected to be used for the
session.
Also, BigIron RX support Secure Copy (SCP) for securely transferring files between a BigIron RX and
an SCP-enabled remote hosts. Refer to
NOTE
The SSH feature includes software that is copyright Allegro Software Development Corporation.

SSH version 2 support

SSHv2 is a substantial revision of Secure Shell, comprising the following hybrid protocols and
definitions:
BigIron RX Series Configuration Guide
53-1001810-01
Overview of Secure Shell (SSH) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 867
Configuring SSH. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 869
Displaying SSH connection information. . . . . . . . . . . . . . . . . . . . . . . . . . . . 875
Using secure copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 876
SSH Transport Layer Protocol
SSH Authentication Protocol
SSH Connection Protocol
SECSH Public Key File Format
SSH Fingerprint Format
SSH Protocol Assigned Numbers
SSH Transport Layer Encryption Modes
"Using secure copy"
on page 876 for more information.
Chapter
28
867

Advertisement

Table of Contents
loading

This manual is also suitable for:

Brocade dcx-4sBrocade dcx

Table of Contents