View the configured and active global settings for the algorithms that control the SSH connection.
exec
show switchServices sshd algorithms
Heading | Description | Filter |
---|---|---|
Operational Encryption | A list of one or more of the active, running encryption algorithms. | operEncryption text |
Operational HMAC | A list of one or more of the active, running HMAC algorithms. Valid values: hmac-md5: a 16-byte hash hmac-sha1: a 20-byte hash hmac-md5-96: a 16-byte hash, truncated to 96 bits (12 bytes) hmac-sha1-96: a 20-byte hash, truncated to 96 bits (12 bytes). |
operHmac text |
Operational Compression | The active (and default) compression algorithm, none. | operCompression text |
Operational User Authentication | A list of one or more of the accepted user authentication methods. Valid values: publicKey: requires cryptographic keys password: requires login password none: requires no user authentication. If both systems agree on no authentication, you may have seriously compromised security. In addition, the system does not allow file transfers with no authentication. |
operUserAuthentication text |
Operational Host Authentication | A list of client addresses that you want to explicitly permit or deny, from the running configuration. If the output is preceded with an exclamation point (!), the system denies the identified hosts. | operHostAuthentication text |
Supported Encryption | A dynamic list of the encryption algorithms supported. | supportedEncryption text |
Supported HMAC | A list of one or more supported HMAC algorithms, from the running configuration. Valid values: hmac-md5: a 16-byte hash hmac-sha1: a 20-byte hash hmac-md5-96: a 16-byte hash, truncated to 96 bits (12 bytes) hmac-sha1-96: a 20-byte hash, truncated to 96 bits (12 bytes). |
supportedHmac text |
Supported Compression | The supported (and default) compression algorithm, none. | supportedCompression text |
Supported User Authentication | A list of one or more of the supported user authentication methods. Valid values: publicKey: requires cryptographic keys password: requires login password none: requires no user authentication. If both systems agree on no authentication, you may have seriously compromised security. In addition, the system does not allow file transfers with no authentication. |
supportedUserAuthentication text |
Supported Host Authentication | A list of client addresses that you want to explicitly permit or deny, from the running configuration. If the output is preceded with an exclamation point (!), the system denies the identified hosts. | supportedHostAuthentication text |
You can do the following