[Contents] [Prev] [Next] [Index] [Report an Error]

Configuring Message Authentication

The SSH server and SSH client maintain separate lists of the message authentication algorithms that each supports. Lists are kept for inbound and outbound algorithms. For the server, inbound means the algorithms that the server supports for information coming in from a client. For the server, outbound means the algorithms that the server supports for information it sends out to a client. You must configure each list separately. By default, all of the supported encryption algorithms are available. You need to configure encryption only if you need to specifically remove or add any supported algorithm from the list. The system supports the following SSH algorithms for hash function-based message authentication:

Although it is not recommended, you can also specify none. In this case, the system does not verify the integrity of the data.

ip ssh mac


[Contents] [Prev] [Next] [Index] [Report an Error]