Step
2.
Specify key exchange
algorithms for SSH2.
Specifying public key algorithms for SSH2
Step
1.
Enter system view.
2.
Specify public key
algorithms for SSH2.
Specifying encryption algorithms for SSH2
Step
1.
Enter system view.
2.
Specify encryption
algorithms for SSH2.
Command
•
In non-FIPS mode:
ssh2 algorithm
key-exchange
{ dh-group-exchange-sha1
| dh-group1-sha1 |
dh-group14-sha1 |
ecdh-sha2-nistp256 |
ecdh-sha2-nistp384 } *
•
In FIPS mode:
ssh2 algorithm
key-exchange
{ dh-group14-sha1 |
ecdh-sha2-nistp256 |
ecdh-sha2-nistp384 } *
Command
system-view
•
In non-FIPS mode:
ssh2 algorithm public-key
{ dsa | ecdsa | rsa |
x509v3-ecdsa-sha2-nistp384 |
x509v3-ecdsa-sha2-nistp256 }
*
•
In FIPS mode:
ssh2 algorithm public-key
{ ecdsa | rsa |
x509v3-ecdsa-sha2-nistp384 |
x509v3-ecdsa-sha2-nistp256 }
*
Command
system-view
•
In non-FIPS mode:
ssh2 algorithm cipher
{ 3des-cbc | aes128-cbc |
aes256-cbc | des-cbc |
aes128-ctr | aes192-ctr |
aes256-ctr | aes128-gcm |
aes256-gcm } *
•
In FIPS mode:
ssh2 algorithm cipher
{ aes128-cbc | aes256-cbc |
aes128-ctr | aes192-ctr |
aes256-ctr | aes128-gcm |
aes256-gcm } *
378
Remarks
By default, SSH2 uses the key
exchange algorithms
ecdh-sha2-nistp256,
ecdh-sha2-nistp384,
dh-group-exchange-sha1,
dh-group14-sha1, and
dh-group1-sha1 in descending
order of priority for algorithm
negotiation.
Remarks
N/A
By default, SSH2 uses the public
key algorithms
x509v3-ecdsa-sha2-nistp256,
x509v3-ecdsa-sha2-nistp384,
ecdsa, rsa, and dsa in
descending order of priority for
algorithm negotiation.
Remarks
N/A
By default, SSH2 uses the
encryption algorithms aes128-ctr,
aes192-ctr, aes256-ctr,
aes128-gcm, aes256-gcm,
aes128-cbc, 3des-cbc,
aes256-cbc, and des-cbc in
descending order of priority for
algorithm negotiation.