The SSH key-exchange specifies the algorithms used for generating one-time session keys for encryption and authentication with the SSH server. 
  
 
	 About this task
 
		 See the online help on the device for the
				complete list of supported key exchange algorithms. 
 
		For backward compatibility, the string "dh-group-14" is also acceptable in place of "diffie-hellman-group-14-sha1". 
		
 
		 
		
 
	 
 
	 Procedure
-  
		  Enter global configuration mode. 
		   
		   
			 device# configure terminal 
 
- 
				Use the ssh server
						key-exchange command to set the key exchange algorithm for the
					server. 
				You can use multiple key
					exchange algorithms by separating the string names with commas.  
					device(config)# ssh server key-exchange diffie-hellman-group14-sha1,ecdh-sha2-nistp521 
 
- 
				Use the ssh client
						key-exchange command to set the key exchange algorithm for the
					client. 
				You can use multiple key
					exchange algorithms by separating the string names with commas.  
					device(config)# ssh client key-exchange diffie-hellman-group14-sha1,ecdh-sha2-nistp521 
 The following ssh server and ssh client key
					exchange algorithms are supported in FIPS mode:  
						- ecdh-sha2-nistp256
- diffie-hellman-group-exchange-sha256
- diffie-hellman-group14-sha1
  The following ssh server and ssh client key exchange algorithms are
					supported in CC mode:  
						- ecdh-sha2-nistp256
- diffie-hellman-group14-sha1
 
- 
				Restart the SSH server from EXEC
					mode using the ssh-server restart command for the new configuration to take
					effect. 
				
					device(config)# exit
device# ssh-server restart