Secure Shell version 2 (SSHv2) is allowed in FIPS mode.
The following SSH commands are affected when the Extreme device is in FIPS mode:
During SSH connection, encryption is done using AES 256 or AES 128, depending on client's capability.
FIPS Compliance: SCP needs to be enabled
Use the show ip ssh config command to display SSH configuration information.
For more information on the show ip ssh config command, refer to the Extreme NetIron Security Configuration Guide.
SSH key generation time is affected by the increased security of authentication and encryption algorithms both in and out of FIPS mode.
The ip ssh password-authentication [ no | yes ] command is used to disable the password authentication for SSH. The ip ssh interactive-authentication [ no | yes ] command is used to disable the interactive authentication for SSH. For more information about these commands, refer to the Extreme NetIron Security Configuration Guide.
Extreme NetIron release | SSH cipher supported |
---|---|
Pre-5.8 FIPS mode | aes256-cbc and aes128-cbc |
5.8 and later FIPS mode |
aes256-ctr, aes192-ctr, aes128-ctr, aes256-cbc,aes192-cbc, and aes128-cbc |
5.8 and later JITC mode | aes256-ctr, aes192-ctr, and aes128-ctr |
5.8 and later CC mode | aes256-cbc and aes128-cbc |
Refer to the Extreme NetIron configuration guides for SSH key generation time ranges.