device(config)# do show running-config ssh server cipher
ssh server cipher aes192-cbc,aes128-ctr
device(config)# do show running-config ssh client cipher
ssh client cipher aes192-cbc,aes128-ctr
device(config)# do show ssh server status
SSH Server Rekey Volume: 1024
SSH Server Auth Tries: 6
SSH Server Login Timeout: 120
VRF-Name: mgmt-vrf Status: Enabled
VRF-Name: default-vrf Status: Enabled
device(config)# do show ssh client status
SSH Client Cipher: aes192-cbc,aes128-ctr
To see the complete list of
supported server or client ciphers, use one of the following commands.
device(config)# ssh server cipher ?
Possible completions:
<string> Ciphers supported :- aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc,
aes256-cbc, aes128-gcm@openssh.com,
aes256-gcm@openssh.com,3des-cbc,blowfish-cbc,cast128-cbc,arcfour, arcfour128,
arcfour256, rijndael-cbc@lysator.liu.se, chacha20-poly1305@openssh.com. Ciphers
recommended in FIPS mode :- aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc,
aes192-cbc, aes256-cbc. Configuring anything else is a security risk. Ciphers
recommended in CC mode :- aes128-ctr, aes256-ctr, aes128-cbc, aes256-cbc.
Configuring anything else is a security risk.
device(config)# ssh client cipher ?
Possible completions:
<string> Ciphers supported :- aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc, aes192-cbc,
aes256-cbc, aes128-gcm@openssh.com,
aes256-gcm@openssh.com,3des-cbc,blowfish-cbc,cast128-cbc,arcfour, arcfour128,
arcfour256, rijndael-cbc@lysator.liu.se, chacha20-poly1305@openssh.com. Ciphers
recommended in FIPS mode :- aes128-ctr, aes192-ctr, aes256-ctr, aes128-cbc,
aes192-cbc, aes256-cbc. Configuring anything else is a security risk. Ciphers
recommended in CC mode :- aes128-ctr, aes256-ctr, aes128-cbc, aes256-cbc.
Configuring anything else is a security risk.