Brocade FastIron Ethernet Switch Security Configuration Gu Manual de usuario Pagina 83

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 396
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 82
Encryption is provided with 3des-cbc , aes128-cbc , aes192-cbc or aes256-cbc . AES encryption
has been adopted by the U.S. Government as an encryption standard.
Data integrity is ensured with hmac-sha1.
Supported authentication methods are Password , interactive, and Key authentication.
Five inbound SSH connection at one time are supported.
Five outbound SSH is supported.
SSH2 unsupported features
The following are not supported with SSH2:
Compression
TCP/IP port forwarding, X11 forwarding, and secure file transfer
SSH version 1
SSH2 authentication types
The Brocade implementation of SSH2 supports the following types of user authentication:
DSA challenge-response authentication , where a collection of public keys are stored on the device.
Only clients with a private key that corresponds to one of the stored public keys can gain access to
the device using SSH.
RSA challenge-response authentication , where a collection of public keys are stored on the device.
Only clients with a private key that corresponds to one of the stored public keys can gain access to
the device using SSH.
Password authentication , where users attempting to gain access to the device using an SSH client
are authenticated with passwords stored on the device or on a TACACS or TACACS+ server or a
RADIUS server.
Interactive-authentication
Keyboard-interactive authentication
Configuring SSH2
You can configure the device to use any combination of these authentication types. The SSH server
and client negotiate which type to use.
To configure SSH2, follow these steps:
1. Generate a host Digital Signature Algorithm (DSA) or Ron Rivest, Adi Shamir and Leonard Adleman
Algorithm (RSA), and private key pair for the device.
See the section Enabling and disabling SSH by generating and deleting host keys on page 84.
2. Configure DSA or RSA challenge-response authentication.
See the section Configuring DSA or RSA challenge-response authentication on page 86.
3. Set optional parameters.
See the section Optional SSH parameters on page 88.
SSH2 unsupported features
FastIron Ethernet Switch Security Configuration Guide 83
53-1003088-03
Vista de pagina 82
1 2 ... 78 79 80 81 82 83 84 85 86 87 88 ... 395 396

Comentarios a estos manuales

Sin comentarios