■ciphers inbound/outbound—Encryption algorithms used by the client
and the system for this session
■MAC inbound/outbound—Message authentication code algorithms used
by the client and the system for this session
â– Example
host1#show ip ssh detail
SSH Server version: SSH-2.0-2.0.12
SSH Server status: enabled, up since THU JUL 24 2008 16:01:17 UTC
supported encryption, inbound: 3des-cbc,blowfish-cbc,twofish-cbc
supported encryption, outbound: 3des-cbc,blowfish-cbc,twofish-cbc
supported MAC, inbound: hmac-sha1,hmac-sha1-96,hmac-md5
supported MAC, outbound: hmac-sha1,hmac-sha1-96,hmac-md5
user authentication: enabled
user authentication protocol: TACACS+
retry limit: 20
sleep period: 600
timeout: 600
connections since last system reset: 4 out of 4 attempts
connections since daemon startup: 4 out of 4 attempts
active sessions: 1
MAC
inbound/outbound
ciphers
inbound/outboundclient version
uptime
(d:h:m:s)hostusernameid
hmac-md5/hmac-md53des-cbc/3des-cbcSSH-2.0-2.0.12
F-SECURE SSH
0:00:00:1910.0.0.145mcarr3
â– To view failed connection attempts and other protocol errors logged at the error
severity level, use the show log data command:
host1#show log data category ssh severity error
â– See show ip ssh.
Terminating an SSH Session
You can use the session identifier to terminate an SSH session.
disconnect ssh
Secure System Administration with SSH â– 445
Chapter 7: Passwords and Security