Configuring Legacy Ssh Algorithm Support - Cisco Nexus 9000 Series Configuration Manual

Nx-os security configuration guide, release 9.x
Hide thumbs Also See for Nexus 9000 Series:
Table of Contents

Advertisement

Configuring SSH and Telnet
Command or Action
Example:
switch(config-trustpoint)# crypto ca crl request
winca bootflash:crllist.crl
Step 7
(Optional) show crypto ca certificates
Example:
switch(config-trustpoint)# show crypto ca
certificates
Step 8
(Optional) show crypto ca crl trustpoint
Example:
switch(config-trustpoint)# show crypto ca crl
winca
Step 9
(Optional) show user-account
Example:
switch(config-trustpoint)# show user-account
Step 10
(Optional) show users
Example:
switch(config-trustpoint)# show users
Step 11
(Optional) copy running-config startup-config
Example:
switch(config-trustpoint)# copy running-config
startup-config

Configuring Legacy SSH Algorithm Support

You can configure support for legacy SSH security algorithms, message authentication codes (MACs), key
types, and ciphers.
SUMMARY STEPS
1. configure terminal
2. (Optional) ssh kexalgos all
3. (Optional) ssh macs all
4. (Optional) ssh ciphers all
5. (Optional) ssh keytypes all
Purpose
certificates by the trustpoint. This static CRL list is
manually copied to the device from the Certification
Authority (CA).
Note
Note
Displays the configured certificate chain and associated
trustpoint.
Displays the contents of the CRL list of the specified
trustpoint.
Displays configured user account details.
Displays the users logged into the device.
Copies the running configuration to the startup
configuration.
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
Configuring Legacy SSH Algorithm Support
Static CRL is the only supported revocation
check method.
To delete the CRL, enter the delete crl
command.
141

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents