146
ecdh-sha2-nistp256 |
ecdh-sha2-nistp384 } *
• In FIPS mode:
ssh2 algorithm
key-exchange {
dh-group14-sha1 |
ecdh-sha2-nistp256 |
ecdh-sha2-nistp384 } *
dh-group14-sha1
, and
dh-group1-sha1
in descending
order of priority for algorithm
negotiation.
Specifying public key algorithms for SSH2
1. Enter system view.
system-view
N/A
2. Specify public key
algorithms for SSH2.
• In non-FIPS mode:
ssh2 algorithm public-key {
dsa | ecdsa | rsa |
x509v3-ecdsa-sha2-nistp384 |
x509v3-ecdsa-sha2-nistp256 }
*
• In FIPS mode:
ssh2 algorithm public-key {
ecdsa | rsa |
x509v3-ecdsa-sha2-nistp384 |
x509v3-ecdsa-sha2-nistp256 }
*
By default, SSH2 uses the public
key algorithms
x509v3-ecdsa-sha2-nistp256
,
x509v3-ecdsa-sha2-nistp384
,
ecdsa
,
rsa
, and
dsa
in
descending order of priority for
algorithm negotiation.
Specifying encryption algorithms for SSH2
1. Enter system view.
system-view
N/A
2. Specify encryption
algorithms for SSH2.
• In non-FIPS mode:
ssh2 algorithm cipher {
3des-cbc | aes128-cbc |
aes256-cbc | des-cbc |
aes128-ctr | aes192-ctr |
aes256-ctr | aes128-gcm |
aes256-gcm } *
• In FIPS mode:
ssh2 algorithm cipher {
aes128-cbc | aes256-cbc |
aes128-ctr | aes192-ctr |
aes256-ctr | aes128-gcm |
aes256-gcm } *
By default, SSH2 uses the
encryption algorithms
aes128-ctr
,
aes192-ctr
,
aes256-ctr
,
aes128-gcm
,
aes256-gcm
,
aes128-cbc
,
3des-cbc
,
aes256-cbc
, and
des-cbc
in
descending order of priority for
algorithm negotiation.
Specifying MAC algorithms for SSH2
1. Enter system view.
system-view
N/A
2. Specify MAC algorithms for
SSH2.
• In non-FIPS mode:
ssh2 algorithm mac { md5 |
md5-96 | sha1 | sha1-96 |
sha2-256 | sha2-512 } *
• In FIPS mode:
ssh2 algorithm mac { sha1
By default, SSH2 uses the MAC
algorithms
sha2-256
,
sha2-512
,
sha1
,
md5
,
sha1-96
, and
md5-96
in descending order of priority for
algorithm negotiation.