Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Configure SSH on the Evaluated Configuration

This topic describes how to configure SSH for remote management of TOE. The following algorithms that needs to be configured to validate SSH.

To configure SSH on the TOE:

  1. Specify the permissible SSH host-key algorithms for the system services.

    Note that configuring rsa enables ssh-rsa, rsa-sha2-256, and rsa-sha2-512.

  2. Specify the SSH key-exchange for Elliptic Curve Diffie-Hellman keys for the system services.

  3. Specify all the permissible message authentication code algorithms for SSHv2

  4. Specify the ciphers allowed for protocol version 2.

  5. Commit the changes:

Supported SSH hostkey algorithm:

Supported SSH key-exchange algorithm:

Supported MACs algorithm:

Supported SSH ciphers algorithm: