Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Configuring SSH on the Evaluated Configuration

SSH is an allowed remote management interface in the evaluated configuration. This topic describes how to configure SSH on the device.

The following algorithms that needs to be configured to validate SSH for FIPS.

To configure SSH on the DUT:

  1. Specify the permissible SSH host-key algorithms for the system services.
  2. Specify the SSH key-exchange for Diffie-Hellman keys for the system services.
  3. Specify all the permissible message authentication code algorithms for SSHv2
  4. Specify the ciphers allowed for protocol version 2.
  5. Commit the changes:
Note:

To disable SSH service, you can deactivate and commit the SSH configurations:

Note:

To disable Netconf service, you can deactivate and commit the netconf configurations:

Supported SSH hostkey algorithm:

Supported SSH key-exchange algorithm:

Supported MAC algorithm:

Supported SSH ciphers algorithm:

The SSH uses the OpenSSL FIPS approved algorithms by setting the FIPS configuration file to /etc/ssl/openssl-fips.cnf. Set the configuration file using the following command from shell: