379
Specifying MAC algorithms for SSH2
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Specify MAC algorithms for
SSH2.
•
In non-FIPS mode:
ssh2 algorithm mac
{
md5
|
md5-96
|
sha1
|
sha1-96
|
sha2-256
|
sha2-512
}
*
•
In FIPS mode:
ssh2 algorithm mac
{
sha1
|
sha1-96
|
sha2-256
|
sha2-512
}
*
By default, SSH2 uses the MAC
algorithms
sha2-256
,
sha2-512
,
sha1
,
md5
,
sha1-96
, and
md5-96
in descending order of
priority for algorithm negotiation.
Displaying and maintaining SSH
Execute
display
commands in any view.
Task Command
Display the source IP address configured for
the SFTP client.
display sftp client source
Display the source IP address configured for
the Stelnet client.
display ssh client source
Display SSH server status or sessions.
display ssh server
{
session
|
status
}
Display SSH user information on the SSH
server.
display ssh user-information
[
username
]
Display the public keys of the local key pairs.
display public-key local
{
dsa
|
ecdsa
|
rsa
}
public
[
name
publickey-name
]
Display information about peer public keys.
display public-key peer
[
brief
|
name
publickey-name
]
Stelnet configuration examples
Unless otherwise noted, devices in the configuration examples operate in non-FIPS mode.
When you configure SSH on devices operating in FIPS mode, follow these restrictions and
guidelines:
•
The modulus length of the key pair must be 2048 bits.
•
When the device acts as the Stelnet server, it supports only RSA and ECDSA key pairs. If both
RSA and ECDSA key pairs exist on the server, the server uses the ECDSA key pair.
Password authentication enabled Stelnet server
configuration example
Network requirements
As shown in
:
•
The switch acts as the Stelnet server and uses password authentication.
•
The username and password of the client are saved on the switch.
Summary of Contents for 10500 series
Page 326: ...312 No duration limit for this SA ...