security ssh show

Display SSH configuration options

Availability: This command is available to cluster and Vserver administrators at the admin privilege level.

Description

The security ssh show command displays the configurations of the SSH key exchange algorithms, ciphers, MAC algorithms and maximum authentication retry count for the cluster and Vservers. The SSH protocol uses a Diffie-Hellman based key exchange method to establish a shared secret key during the SSH negotiation phrase. The key exchange method specifies how one-time session keys are generated for encryption and authentication and how the server authentication takes place. Data ONTAP supports the diffie-hellman-group-exchange-sha256 key exchange algorithm for SHA-2. Data ONTAP also supports the diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, and diffie-hellman-group1-sha1 key exchange algorithms for SHA-1. Data ONTAP also supports ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, curve25519-sha256. Data ONTAP also supports the AES and 3DES symmetric encryptions (also known as ciphers) of the following types: aes256-ctr, aes192-ctr, aes128-ctr, aes256-cbc, aes192-cbc, aes128-cbc, aes128-gcm, aes256-gcm and 3des-cbc. Data ONTAP supports MAC algorithms of the following types: hmac-sha1, hmac-sha1-96, hmac-md5, hmac-md5-96, hmac-ripemd160, umac-64, umac-64, umac-128, hmac-sha2-256, hmac-sha2-512, hmac-sha1-etm, hmac-sha1-96-etm, hmac-sha2-256-etm, hmac-sha2-512-etm, hmac-md5-etm, hmac-md5-96-etm, hmac-ripemd160-etm, umac-64-etm, umac-128-etm

Parameters

{ [-fields <fieldname>, ...]
If you specify the -fields <fieldname>, ... parameter, the command output also includes the specified field or fields. You can use '-fields ?' to display the fields to specify.
| [-instance ]}
If you specify the -instance parameter, the command displays detailed information about all fields.
[-vserver <Vserver Name>] - Vserver
Identifies the Vserver for which you want to display the SSH key exchange algorithm, cipher, and MAC algorithm configurations.
[-key-exchange-algorithms <algorithm name>, ...] - Key Exchange Algorithms
Displays the Vserver or Vservers that have the specified key exchange algorithms enabled.
[-ciphers <cipher name>, ...] - Ciphers
Displays the Vserver or Vservers that have the specified ciphers enabled.
[-mac-algorithms <MAC name>, ...] - MAC Algorithms
Displays the Vserver or Vservers that have the specified MAC algorithm or algorithms.
[-max-authentication-retry-count <integer>] - Max Authentication Retry Count
Displays Vservers with a matching maximum authentication retry count value.

Examples

The following command displays the enabled SSH key exchange algorithms, ciphers, MAC algorithms and maximum number of authentication retry count for the cluster and all Vservers. The cluster settings are used as the default for all newly created Vservers:
cluster-1::> security ssh show
                           Key Exchange  MAC              Max Authentication
Vserver        Ciphers     Algorithms    Algorithms              Retry Count
-------------- ----------  ------------  --------------   ------------------
cluster-1      3des-cbc    diffie-       hmac-sha1                         4
                           hellman-
                           group-
                           exchange-
                           sha256
vs1            aes256-     diffie-       hmac-sha1,                        6
               ctr,        hellman-      hmac-sha1-96,
               aes192-     group-        hmac-sha2-256,
               ctr,        exchange-     hmac-sha2-512,
               aes128-     sha256,       hmac-sha1-etm,
               ctr,        diffie-       hmac-sha1-96-
               aes256-     hellman-      etm,
               cbc,        group-        hmac-sha2-256-
               aes192-     exchange-     etm,
               cbc,        sha1,         hmac-sha2-512-
               aes128-     diffie-       etm, hmac-md5,
               cbc,        hellman-      hmac-md5-96,
               3des-cbc,   group14-      hmac-
               aes128-     sha1,         ripemd160,
               gcm,        ecdh-sha2-    umac-64,
               aes256-gcm  nistp256,     umac-128,
                           ecdh-sha2-    hmac-md5-etm,
                           nistp384,     hmac-md5-96-
                           ecdh-sha2-    etm,
                           nistp521,     hmac-
                           curve25519-   ripemd160-etm,
                           sha256        umac-64-etm,
                                         umac-128-etm
2 entries were displayed.