Overview Of Secure Shell (Ssh); In This Chapter; Ssh Version 2 Support - Dell PowerConnect B-RX Configuration Manual

Bigiron rx series configuration guide v02.8.00
Hide thumbs Also See for PowerConnect B-RX:
Table of Contents

Advertisement

Configuring Secure Shell

In this chapter

Overview of Secure Shell (SSH)

Secure Shell (SSH) is a mechanism for allowing secure remote access to management functions on
a BigIron RX. SSH provides a function similar to Telnet. Users can log into and configure the device
using a publicly or commercially available SSH client program, just as they can with Telnet.
However, unlike Telnet, which provides no security, SSH provides a secure, encrypted connection to
the device.
SSHv2 is supported on the device. Brocade's SSHv2 implementation is compatible with all versions
of the SSHv2 protocol (2.1, 2.2, and so on). At the beginning of an SSH session, the device
negotiates the version of SSHv2 to be used. The highest version of SSHv2 supported by both the
device and the client is the version that is used for the session. Once the SSHv2 version is
negotiated, the encryption algorithm with the highest security ranking is selected to be used for the
session.
Also, the device support Secure Copy (SCP) for securely transferring files between a device and an
SCP-enabled remote hosts. Refer to
NOTE
The SSH feature includes software that is copyright Allegro Software Development Corporation.

SSH version 2 support

SSHv2 is a substantial revision of Secure Shell, comprising the following hybrid protocols and
definitions:
BigIron RX Series Configuration Guide
53-1002253-01
Overview of Secure Shell (SSH) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 913
Configuring SSH. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 914
Displaying SSH connection information. . . . . . . . . . . . . . . . . . . . . . . . . . . . 921
Using secure copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 922
SSH Transport Layer Protocol
SSH Authentication Protocol
SSH Connection Protocol
SECSH Public Key File Format
SSH Fingerprint Format
SSH Protocol Assigned Numbers
SSH Transport Layer Encryption Modes
"Using secure copy"
on page 922 for more information.
Chapter
30
913

Advertisement

Table of Contents
loading

This manual is also suitable for:

Bigiron rx series

Table of Contents