EasyManuals Logo

HPE FlexNetwork 5510 HI Series Security Configuration Guide

HPE FlexNetwork 5510 HI Series
551 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #365 background imageLoading...
Page #365 background image
352
If you specify algorithms, SSH2 uses only the specified algorithms for algorithm negotiation. The
client uses the specified algorithms to initiate the negotiation, and the server uses the matching
algorithms to negotiate with the client.
If multiple algorithms of the same type are specified, the algorithm specified earlier has a higher
priority during negotiation. The specified SSH2 algorithms do not affect SSH1 sessions.
Specifying key exchange algorithms for SSH2
Step
Command
Remarks
1. Enter system view.
system-view
N/A
2.
Specify key exchange
algorithms for SSH2.
• In non-FIPS mode:
ssh
2 algorithm
key-exchange
{ dh-group-exchange-sha1
| dh-group1-sha1 |
dh-group14-sha1 |
ecdh-sha2-nistp256 |
ecdh-sha2-nistp384 } *
• In FIPS mode:
ssh2 algorithm
key-exchange
{ dh-group14-sha1 |
ecdh-sha2-nistp256 |
ecdh-sha2-nistp384 } *
By default, SSH2
uses the key
exchange algorithms
ecdh-sha2-nistp256
,
ecdh-sha2-nistp384
,
dh-group-exchange-sha1
,
dh-group14-sha1
, and
dh-group1-sha1
in descending
order of priori
ty for algorithm
negotiation.
Specifying public key algorithms for SSH2
Step
Command
Remarks
1. Enter system view.
system-view
N/A
2. Specify
public key
algorithms for SSH2.
• In non-FIPS mode:
ssh2 algorithm public-key
{ dsa | ecdsa | rsa |
x509v3-ecdsa-sha2-nistp384 |
x509v3-ecdsa-sha2-nistp256 }
*
• In FIPS mode:
ssh2 algorithm public-key
{ ecdsa | rsa |
x509v3-ecdsa-sha2-nistp384 |
x509v3-ecdsa-sha2-nistp256 }
*
By default, SSH2 uses the public
key algorithms
x509v3-ecdsa-sha2-nistp256
,
x509v3-ecdsa-sha2-nistp384
,
ecdsa
,
rsa
, and
dsa
in
descending order of priority for
algorithm negotiation.
Specifying encryption algorithms for SSH2
Step
Command
Remarks
1. Enter system view.
system-view
N/A
2. Specify encryption
algorithms for SSH2.
• In non-FIPS mode:
ssh
2 algorithm cipher
{ 3des-cbc | aes128-cbc |
aes256-cbc | des-cbc |
aes128-ctr | aes192-ctr |
aes256-ctr | aes128-gcm |
By default, SSH2 uses the
encryption algorithms
aes128-ctr
,
aes192-ctr
,
aes256-ctr
,
aes128-gcm
,
aes256-gcm
,
aes128-cbc
,
3des-cbc
,
aes256-cbc
, and
des-cbc
in

Table of Contents

Other manuals for HPE FlexNetwork 5510 HI Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HPE FlexNetwork 5510 HI Series and is the answer not in the manual?

HPE FlexNetwork 5510 HI Series Specifications

General IconGeneral
BrandHPE
ModelFlexNetwork 5510 HI Series
CategorySwitch
LanguageEnglish

Related product manuals