SSH related audit log entries

Table 1. SSH related audit log entries
Operation Log Details
SSH Successful Login Jan 17 11:18:59:I:Security: SSH login by Test_1234 from src IP 10.6.40.119 to USER EXEC mode using RSA as Server Host Key
SSH Failed login attempt Jan 17 11:20:39:I:Security: SSH access by user abc from src IP 10.6.40.119 rejected, 1 attempt(s)
SSH logout record/Inactivity timeout (Used by netconf as well) Jan 17 11:20:17:I:Security: SSH logout by Test_1234 from src IP 10.6.40.119 from USER EXEC mode using RSA as Server Host Key
Login timeout occurred on SSH session Jan 17 11:30:31:I:SSH: SSH disconnect due to login timeout for session from client 10.24.12.107 session id 0
Server hostkey change via CLI Jan 17 11:16:19:I:CLI CMD: "crypto key generate rsa modulus 2048" from console

eg: Jan 17 11:16:18:I:Security: SSH Server RSA as Server Host Key enabled by operator from console session

Idle timeout change via CLI Jan 17 11:30:15:I:CLI CMD: "ip ssh idle-time 235" from console
Authenticated retries change via CLI Jan 17 11:30:31:I:CLI CMD: "ip ssh authentication-retries 4" from console
Encryption algorithm change via CLI Jan 17 11:40:20:I:CLI CMD: "ip ssh encryption aes-only" from console
Invalid hostkey Jan 17 11:40:20:E:SSH: Invalid hostkey algorithm recieved from client 10.24.12.107 session id 0 algorithm received ssh-dsa
Invalid key-exchange algorithm Jan 17 11:40:20:E:SSH: Invalid key exchange algorithm recieved from client 10.24.12.107 session id 0 algorithm received diffie-hellman-group-exchange-sha256
Invalid cipher algorithm Jan 17 11:40:20:E:SSH: Invalid cipher algorithm received from client 10.24.12.107 session id 0 algorithm recieved aes-256cbc
Invalid MAC algorithm Jan 17 11:40:20:E:SSH: Invalid mac algorithm recieved from client 10.24.12.107 session id 0 algorithm received hmac-sha2-512
Invalid packet received Jan 17 11:40:20:W:SSH: SSH: Packet of invalid length not within range of buffer received from client 10.10.10.1 session id 0
Rekey triggered due to rekey interval expiry Jan 17 11:40:20:I:SSH: Going for rekeying since rekey interval = 900 seconds expired for client 10.24.12.107 session id 0
Rekey triggered due to packet volume expiry Jan 17 11:40:20:I:SSH: Going for rekeying since rekey volume = 50 megabytes expired for client 10.24.12.107 session id 0
Login timeout occurred on SSH session Jan 17 11:40:20:I:SSH: SSH disconnect due to login timeout for session from client 10.24.12.107 session id 0
Import an SSH public key Jun 13 17:14:19 cer2024 SCP: Download by admin from src IP 172.16.16.254 to ssh public key. Jun 13 17:14:19 cer2024 SCP: SSH Public key file downloaded successfully.
Delete an SSH public key Jun 13 16:31:41 cer2024 CLI CMD: "ip ssh pub-key remove" by admin from ssh client 172.16.16.254
SSH timeout Jun 17 17:36:16 cer2024 Security: ssh timed out by admin from src IP 172.16.16.254 from USER EXEC mode using RSA as Server Host Key