SSHv2

Secure Shell version 2 (SSHv2) is allowed in FIPS mode.

The following SSH commands are affected when the Extreme device is in FIPS mode:

Use the show ip ssh config command to display SSH configuration information.

For more information on the show ip ssh config command, refer to the Extreme NetIron Security Configuration Guide.

SSH key generation time is affected by the increased security of authentication and encryption algorithms both in and out of FIPS mode.

The ip ssh password-authentication [ no | yes ] command is used to disable the password authentication for SSH. The ip ssh interactive-authentication [ no | yes ] command is used to disable the interactive authentication for SSH. For more information about these commands, refer to the Extreme NetIron Security Configuration Guide.

The following table shows the supported SSH ciphers.
Table 1. SSH ciphers supported by NetIron devices
Extreme NetIron release SSH cipher supported
Pre-5.8 FIPS mode aes256-cbc and aes128-cbc
5.8 and later FIPS mode

aes256-ctr, aes192-ctr, aes128-ctr,

aes256-cbc,aes192-cbc, and aes128-cbc

5.8 and later JITC mode aes256-ctr, aes192-ctr, and aes128-ctr
5.8 and later CC mode aes256-cbc and aes128-cbc
The following parameters make up the SSHv2 critical security parameters (CSPs):

Refer to the Extreme NetIron configuration guides for SSH key generation time ranges.