Configuration Example: Enable/Disable Ciphers in Default Mode

* Slot-1 Stack.4 # show ssh2
SSH module configuration details:
SSH Access            : Enabled
Key validity          : Valid
TCP port              : 22
VR                    : all
Access profile        : not set
Secure Mode           : Off
Diffie-Hellman Groups : 1 (1024 bits prime), 14 (2048 bits prime)
Idle time             : 60 minutes
Ciphers               : aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, aes192-cbc, aes256-cbc, arcfour, rijndael-cbc@lysator.liu.se, aes128-ctr, aes192-ctr, aes256-ctr, arcfour256, arcfour128, chacha20-poly1305@openssh.com
Macs                  : hmac-md5-etm@openssh.com, hmac-sha1-etm@openssh.com, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-ripemd160-etm@openssh.com, hmac-sha1-96-etm@openssh.com, hmac-md5-96-etm@openssh.com, hmac-md5, hmac-sha1, hmac-sha2-256, hmac-sha2-512, hmac-ripemd160, hmac-ripemd160@openssh.com, hmac-sha1-96, hmac-md5-96
* Slot-1 Stack.4 # show ssh2 ciphers
Ciphers               : aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, aes192-cbc, aes256-cbc, arcfour, rijndael-cbc@lysator.liu.se, aes128-ctr, aes192-ctr, aes256-ctr, arcfour256, arcfour128, chacha20-poly1305@openssh.com

* Slot-1 Stack.5 # configure ssh2 disable cipher 3des

* Slot-1 Stack.6 # show ssh2 ciphers
Ciphers               : aes128-cbc, blowfish-cbc, cast128-cbc, aes192-cbc, aes256-cbc, arcfour, rijndael-cbc@lysator.liu.se, aes128-ctr, aes192-ctr, aes256-ctr, arcfour256, arcfour128, chacha20-poly1305@openssh.com

* Slot-1 Stack.7 # show ssh2
SSH module configuration details:
SSH Access            : Enabled
Key validity          : Valid
TCP port              : 22
VR                    : all
Access profile        : not set
Secure Mode           : Off
Diffie-Hellman Groups : 1 (1024 bits prime), 14 (2048 bits prime)
Idle time             : 60 minutes
Ciphers               : aes128-cbc, blowfish-cbc, cast128-cbc, aes192-cbc, aes256-cbc, arcfour, rijndael-cbc@lysator.liu.se, aes128-ctr, aes192-ctr, aes256-ctr, arcfour256, arcfour128, chacha20-poly1305@openssh.com
Macs                  : hmac-md5-etm@openssh.com, hmac-sha1-etm@openssh.com, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-ripemd160-etm@openssh.com, hmac-sha1-96-etm@openssh.com, hmac-md5-96-etm@openssh.com, hmac-md5, hmac-sha1, hmac-sha2-256, hmac-sha2-512, hmac-ripemd160, hmac-ripemd160@openssh.com, hmac-sha1-96, hmac-md5-96

* Slot-1 Stack.8 # configure ssh2 enable cipher 3des

* Slot-1 Stack.9 # show ssh2 ciphers
Ciphers               : aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, aes192-cbc, aes256-cbc, arcfour, rijndael-cbc@lysator.liu.se, aes128-ctr, aes192-ctr, aes256-ctr, arcfour256, arcfour128, chacha20-poly1305@openssh.com

* Slot-1 Stack.10 # show ssh2
SSH module configuration details:
SSH Access            : Enabled
Key validity          : Valid
TCP port              : 22
VR                    : all
Access profile        : not set
Secure Mode           : Off
Diffie-Hellman Groups : 1 (1024 bits prime), 14 (2048 bits prime)
Idle time             : 60 minutes
Ciphers               : aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, aes192-cbc, aes256-cbc, arcfour, rijndael-cbc@lysator.liu.se, aes128-ctr, aes192-ctr, aes256-ctr, arcfour256, arcfour128, chacha20-poly1305@openssh.com
Macs                  : hmac-md5-etm@openssh.com, hmac-sha1-etm@openssh.com, hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, hmac-ripemd160-etm@openssh.com, hmac-sha1-96-etm@openssh.com, hmac-md5-96-etm@openssh.com, hmac-md5, hmac-sha1, hmac-sha2-256, hmac-sha2-512, hmac-ripemd160, hmac-ripemd160@openssh.com, hmac-sha1-96, hmac-md5-96
* Slot-1 Stack.11 #