[Contents] [Prev] [Next] [Index] [Report an Error]

Configuring Encryption

The embedded SSH server and external SSH client maintain separate lists of the encryption algorithms that each supports. Lists are kept for inbound and outbound algorithms. For the server:

You must configure each list separately. By default, all of the supported encryption algorithms are available. You need to configure encryption only if you need to specifically remove or add any supported algorithm from the list. Refer to your SSH client documentation for details on configuring encryption on your client. The system supports the following SSH algorithms for encryption:

Although it is not recommended, you can also specify none. In this case, the system does not perform encryption.

ip ssh crypto


[Contents] [Prev] [Next] [Index] [Report an Error]