Aes encryption for ssh2, Configuring ssh2, Aes encryption – Brocade TurboIron 24X Series Configuration Guide User Manual

Page 155: For ssh2

Advertising
background image

Brocade TurboIron 24X Series Configuration Guide

121

53-1003053-01

AES encryption for SSH2

AES encryption for SSH2

Encryption is provided with 3des-cbc, aes128-cbc, aes192-cbc or aes256-cbc. AES encryption has
been adopted by the U.S. Government as an encryption standard.

A total of five SSH connections can be active on a device. To display information about SSH
connections, enter the following command.

You can also use the show who command to display information about SSH connections

To terminate an active connection, enter the following command

TurboIron#kill ssh 1

Syntax: kill ssh <connection-id>

Configuring SSH2

The Brocade implementation of SSH2 supports two kinds of user authentication:

DSA challenge-response authentication, where a collection of public keys are stored on the
device. Only clients with a private key that corresponds to one of the stored public keys can
gain access to the device using SSH.

NOTE

SSH2 supports and validates DSA keys only. It does not support or validate SSH1 RSA keys.

TurboIron#show ip ssh

Connection Version Encryption Username

1 SSH-2 3des-cbc Raymond

2 SSH-2 3des-cbc Ron

3 SSH-2 aes128-cbc David

4 SSH-2 aes192-cbc Francesca

5 SSH-2 aes256-cbc Bob

TurboIron#show who

Console connections:

Established

you are connecting to this session

2 minutes 56 seconds in idle

SSH connections:

1. established, client ip address 10.2.2.1, user is Raymond

1 minutes 15 seconds in idle

2. established, client ip addres 10.2.2.2, user is Ron

2 minutes 25 seconds in idle

3. established, client ip address 10.2.2.1, user is David

1 minutes 8 seconds in idle

4. established, client ip address 10.2.2.1, user is Franchesca

2 minutes 32 seconds in idle

5. established, client ip address 10.2.2.3, user is Bob

5 minutes 17 seconds in idle

Advertising