Aes encryption for ssh2, Configuring ssh2, Aes encryption – Brocade TurboIron 24X Series Configuration Guide User Manual
Page 155: For ssh2

Brocade TurboIron 24X Series Configuration Guide
121
53-1003053-01
AES encryption for SSH2
AES encryption for SSH2
Encryption is provided with 3des-cbc, aes128-cbc, aes192-cbc or aes256-cbc. AES encryption has
been adopted by the U.S. Government as an encryption standard.
A total of five SSH connections can be active on a device. To display information about SSH
connections, enter the following command.
You can also use the show who command to display information about SSH connections
To terminate an active connection, enter the following command
TurboIron#kill ssh 1
Syntax: kill ssh
Configuring SSH2
The Brocade implementation of SSH2 supports two kinds of user authentication:
•
DSA challenge-response authentication, where a collection of public keys are stored on the
device. Only clients with a private key that corresponds to one of the stored public keys can
gain access to the device using SSH.
NOTE
SSH2 supports and validates DSA keys only. It does not support or validate SSH1 RSA keys.
TurboIron#show ip ssh
Connection Version Encryption Username
1 SSH-2 3des-cbc Raymond
2 SSH-2 3des-cbc Ron
3 SSH-2 aes128-cbc David
4 SSH-2 aes192-cbc Francesca
5 SSH-2 aes256-cbc Bob
TurboIron#show who
Console connections:
Established
you are connecting to this session
2 minutes 56 seconds in idle
SSH connections:
1. established, client ip address 10.2.2.1, user is Raymond
1 minutes 15 seconds in idle
2. established, client ip addres 10.2.2.2, user is Ron
2 minutes 25 seconds in idle
3. established, client ip address 10.2.2.1, user is David
1 minutes 8 seconds in idle
4. established, client ip address 10.2.2.1, user is Franchesca
2 minutes 32 seconds in idle
5. established, client ip address 10.2.2.3, user is Bob
5 minutes 17 seconds in idle