
Table 15. SSH cryptography schemes
Scheme Type
Algorithms
Asymmetric Cryptography
Public key
ssh-rsa
ecdsa-sha2-nistp256
Symmetric Cryptography
Key Exchange
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
diffie-hellman-group-exchange-sha256
diffie-hellman-group14-sha1
Encryption
aes128-ctr
aes192-ctr
aes256-ctr
MAC
hmac-sha1
hmac-ripemd160
Compression
None
NOTE: If you enable OpenSSH 7.0 or later, DSA public key support is disabled. To ensure better security for iDRAC, Dell
recommends not enabling DSA public key support.
Using public key authentication for SSH
iDRAC supports the Public Key Authentication (PKA) over SSH. This is a licensed feature. When the PKA over SSH is set up and
used correctly, you must enter the user name while logging into iDRAC. This is useful for setting up automated scripts that perform
various functions. The uploaded keys must be in RFC 4716 or OpenSSH format. Else, you must convert the keys into that format.
NOTE: If you enable OpenSSH 7.0 or later, DSA public key support is disabled. To ensure better security for iDRAC, Dell
recommends not enabling DSA public key support.
In any scenario, a pair of private and public key must be generated on the management station. The public key is uploaded to iDRAC
local user and private key is used by the SSH client to establish the trust relationship between the management station and iDRAC.
You can generate the public or private key pair using:
•
PuTTY Key Generator
application for clients running Windows
123
Содержание iDRAC 7
Страница 1: ...iDRAC 8 7 v2 40 40 40 User s Guide ...
Страница 108: ...For more information see the iDRAC RACADM Command Line Interface Reference Guide available at dell com idracmanuals 108 ...
Страница 268: ...By default the logs are available at Event viewer Applications and Services Logs System 268 ...