Brocade Communications Systems Brocade ICX 6650 6650 Manuel D’Utilisation

Page de 332
Brocade ICX 6650 Security Configuration Guide
63
53-1002601-01
Chapter
2
SSH2 and SCP
 lists SSH2 and Secure Copy features supported on Brocade ICX 6650.
 
SSH version 2 overview
Secure Shell (SSH) is a mechanism for allowing secure remote access to management functions on 
a Brocade device. SSH provides a function similar to Telnet. Users can log into and configure the 
device using a publicly or commercially available SSH client program, just as they can with Telnet. 
However, unlike Telnet, which provides no security, SSH provides a secure, encrypted connection to 
the device.
The Brocade SSH2 implementation is compatible with all versions of the SSH2 protocol (2.1, 2.2, 
and so on). At the beginning of an SSH session, the Brocade device negotiates the version of SSH2 
to be used. The highest version of SSH2 supported by both the Brocade device and the client is the 
version that is used for the session. Once the SSH2 version is negotiated, the encryption algorithm 
with the highest security ranking is selected to be used for the session.
Brocade devices also support Secure Copy (SCP) for securely transferring files between a Brocade 
device and SCP-enabled remote hosts.
NOTE
The SSH feature includes software that is copyright Allegro Software Development Corporation.
SSH2 is supported in the Layer 2 and Layer 3 codes.
SSH2 is a substantial revision of Secure Shell, comprising the following hybrid protocols and 
definitions:
SSH Transport Layer Protocol
SSH Authentication Protocol
SSH Connection Protocol
SECSH Public Key File Format
TABLE 12
Supported SSH2 and Secure Copy features
Feature
Brocade ICX 6650
Secure Shell (SSH) version 2
Yes
AES encryption for SSH2
Yes
Optional parameters for SSH2
Yes
Using secure copy (SCP) with SSH2
Yes
Filtering SSH access using ACLs
Yes
Terminating an active SSH connection
Yes
SSH client
Yes