SSH Configuration describes how to configure Secure Shell on an S- K- and 7100-Series device. Secure Shell commands can be entered in any command mode.
Step | Task | Command(s) |
---|---|---|
1 | Enable, disable, or reinitialize the SSH server. | set ssh {enable | disable | reinitialize} |
2 | Set or reinitialize the host key on the SSH server. | set ssh hostkey [reinitialize] |
3 | Modify the SSH Ciphers list for all future sessions on this system. | set ssh ciphers {aes128-ctr | aes192-ctr | aes256-ctr | aes128-cbc | aes192-cbc | aes256-cbc | 3des-cbc |blowfish-cbc|cast128-cbc|rijindael-cbc@lysator.liu.se} |
4 | Modify the SSH MACs list for all future sessions on this system. | set ssh macs {hmac-sha1-etm@openssh.com | hmac-md5-etm@openssh.com | hmac-ripemd160-etm@openssh.com | hmac-sha1-96-etm@openssh.com | hmac-md5-96-etm@openssh.com | hmac-sha1 | hmac-md5 | hmac-ripemd160 | hmac-ripemd160@openssh.com | hmac-sha1-96 | hmac-md5-96} |
5 | Verify the SSH state. | show ssh state |