SSHd algorithms


View the configured and active global settings for the algorithms that control the SSH connection.

Access mode

exec

Syntax

show switchServices sshd algorithms

Output Description

Heading Description Filter
Operational Encryption A list of one or more of the active, running encryption algorithms. operEncryption text
Operational HMAC A list of one or more of the active, running HMAC algorithms.

Valid values:

hmac-md5: a 16-byte hash

hmac-sha1: a 20-byte hash

hmac-md5-96: a 16-byte hash, truncated to 96 bits (12 bytes)

hmac-sha1-96: a 20-byte hash, truncated to 96 bits (12 bytes).
operHmac text
Operational Compression The active (and default) compression algorithm, none. operCompression text
Operational User Authentication A list of one or more of the accepted user authentication methods.

Valid values:

publicKey: requires cryptographic keys

password: requires login password

none: requires no user authentication. If both systems agree on no authentication, you may have seriously compromised security. In addition, the system does not allow file transfers with no authentication.
operUserAuthentication text
Operational Host Authentication A list of client addresses that you want to explicitly permit or deny, from the running configuration. If the output is preceded with an exclamation point (!), the system denies the identified hosts. operHostAuthentication text
Supported Encryption A dynamic list of the encryption algorithms supported. supportedEncryption text
Supported HMAC A list of one or more supported HMAC algorithms, from the running configuration.

Valid values:

hmac-md5: a 16-byte hash

hmac-sha1: a 20-byte hash

hmac-md5-96: a 16-byte hash, truncated to 96 bits (12 bytes)

hmac-sha1-96: a 20-byte hash, truncated to 96 bits (12 bytes).
supportedHmac text
Supported Compression The supported (and default) compression algorithm, none. supportedCompression text
Supported User Authentication A list of one or more of the supported user authentication methods.

Valid values:

publicKey: requires cryptographic keys

password: requires login password

none: requires no user authentication. If both systems agree on no authentication, you may have seriously compromised security. In addition, the system does not allow file transfers with no authentication.
supportedUserAuthentication text
Supported Host Authentication A list of client addresses that you want to explicitly permit or deny, from the running configuration. If the output is preceded with an exclamation point (!), the system denies the identified hosts. supportedHostAuthentication text

Related actions

You can do the following