Chapter 2

SSH2 and SCP

 

 

SSH version 2 overview

63

 

Tested SSH2 clients

64

 

SSH2 supported features

64

 

SSH2 unsupported features

64

SSH2 authentication types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Configuring SSH2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Enabling and disabling SSH by generating and

deleting host keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Configuring DSA or RSA challenge-response authentication . . 67

Optional SSH parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Setting the number of SSH authentication retries . . . . . . . . . . 70 Deactivating user authentication . . . . . . . . . . . . . . . . . . . . . . . . 70 Enabling empty password logins. . . . . . . . . . . . . . . . . . . . . . . . . 71 Setting the SSH port number . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Setting the SSH login timeout value . . . . . . . . . . . . . . . . . . . . . . 71 Designating an interface as the source for all SSH packets. . . 71 Configuring the maximum idle time for SSH sessions . . . . . . . 71

Filtering SSH access using ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Terminating an active SSH connection . . . . . . . . . . . . . . . . . . . . . . . 72

Displaying SSH information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Displaying SSH connection information . . . . . . . . . . . . . . . . . . . 72 Displaying SSH configuration information . . . . . . . . . . . . . . . . . 73 Displaying additional SSH connection information . . . . . . . . . . 74

Secure copy with SSH2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Enabling and disabling SCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Secure copy configuration notes . . . . . . . . . . . . . . . . . . . . . . . . 75 Example file transfers using SCP . . . . . . . . . . . . . . . . . . . . . . . . 75

SSH2 client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Enabling SSH2 client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Configuring SSH2 client public key authentication . . . . . . . . . . 78 Using SSH2 client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Displaying SSH2 client information . . . . . . . . . . . . . . . . . . . . . . 80

Chapter 3

Rule-Based IP ACLs

 

 

ACL overview

82

 

Types of IP ACLs

83

 

ACL IDs and entries

83

 

Numbered and named ACLs

83

 

Default ACL action

84

How hardware-based ACLs work . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 How fragmented packets are processed . . . . . . . . . . . . . . . . . . 84 Hardware aging of Layer 4 CAM entries . . . . . . . . . . . . . . . . . . . 84

ACL configuration considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

Brocade ICX 6650 Security Configuration Guide

v

53-1002601-01

 

Page 5
Image 5
Brocade Communications Systems 6650 manual Chapter