Configuring The Hmac Algorithm For The Ssh Server; Configuring The Hmac Algorithm For The Ssh Client - Dell C9000 Series Networking Configuration Manual

Hide thumbs Also See for C9000 Series:
Table of Contents

Advertisement

Example of Configuring a Cipher List
The following example shows you how to configure a cipher list.
Dell(conf)#ip ssh server cipher 3des-cbc aes128-cbc aes128-ctr
Configuring the HMAC Algorithm for the SSH
Server
To configure the HMAC algorithm for the SSH server, use the ip ssh server mac hmac-algorithm
command in CONFIGURATION mode.
hmac-algorithm: Enter a space-delimited list of keyed-hash message authentication code (HMAC) algorithms
supported by the SSH server.
The following HMAC algorithms are available:
hmac-md5
hmac-md5-96
hmac-sha1
hmac-sha1-96
hmac-sha2-256
The default HMAC algorithms are the following:
hmac-sha2-256
hmac-sha1
hmac-sha1-96
hmac-md5
hmac-md5-96
When FIPS is enabled, the default HMAC algorithm is hmac-sha2-256,hmac-sha1,hmac-sha1-96.
Example of Configuring a HMAC Algorithm
The following example shows you how to configure a HMAC algorithm list.
Dell(conf)# ip ssh server mac hmac-sha1-96
Configuring the HMAC Algorithm for the SSH
Client
To configure the HMAC algorithm for the SSH client, use the ip ssh mac hmac-algorithm command in
CONFIGURATION mode.
Security
1004

Advertisement

Table of Contents
loading

Table of Contents