Example of Configuring a Cipher List
The following example shows you how to configure a cipher list.
Dell(conf)#ip ssh server cipher 3des-cbc aes128-cbc aes128-ctr
Configuring the HMAC Algorithm for the SSH
Server
To configure the HMAC algorithm for the SSH server, use the ip ssh server mac hmac-algorithm
command in CONFIGURATION mode.
hmac-algorithm: Enter a space-delimited list of keyed-hash message authentication code (HMAC) algorithms
supported by the SSH server.
The following HMAC algorithms are available:
•
hmac-md5
•
hmac-md5-96
•
hmac-sha1
•
hmac-sha1-96
•
hmac-sha2-256
The default HMAC algorithms are the following:
•
hmac-sha2-256
•
hmac-sha1
•
hmac-sha1-96
•
hmac-md5
•
hmac-md5-96
When FIPS is enabled, the default HMAC algorithm is hmac-sha2-256,hmac-sha1,hmac-sha1-96.
Example of Configuring a HMAC Algorithm
The following example shows you how to configure a HMAC algorithm list.
Dell(conf)# ip ssh server mac hmac-sha1-96
Configuring the HMAC Algorithm for the SSH
Client
To configure the HMAC algorithm for the SSH client, use the ip ssh mac hmac-algorithm command in
CONFIGURATION mode.
Security
1004