Users Guide
To configure the time or volume rekey threshold at which to re-generate the SSH key during an SSH
session, use the ip ssh rekey [time rekey-interval] [volume rekey-limit] command.
CONFIGURATION mode.
Configure the following parameters:
• rekey-interval: time-based rekey threshold for an SSH session. The range is from 10 to 1440 minutes.
The default is 60 minutes.
• rekey-limit: volume-based rekey threshold for an SSH session. The range is from 1 to 4096 to
megabytes. The default is 1024 megabytes.
Examples
The following example configures the time-based rekey threshold for an SSH session to 30 minutes.
Dell(conf)#ip ssh rekey time 30
The following example configures the volume-based rekey threshold for an SSH session to 4096
megabytes.
Dell(conf)#ip ssh rekey volume 4096
Configuring the SSH Server Cipher List
To configure the cipher list supported by the SSH server, use the ip ssh server cipher cipher-list
command in CONFIGURATION mode.
cipher-list-: Enter a space-delimited list of ciphers the SSH server will support.
The following ciphers are available.
• 3des-cbc
• aes128-cbc
• aes192-cbc
• aes256-cbc
• aes128-ctr
• aes192-ctr
• aes256-ctr
The default cipher list is 3des-cbc,aes128-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr
Example of Configuring a Cipher List
The following example shows you how to configure a cipher list.
Dell(conf)#ip ssh server cipher 3des-cbc aes128-cbc aes128-ctr
Configuring the HMAC Algorithm for the SSH Server
To configure the HMAC algorithm for the SSH server, use the ip ssh server mac hmac-algorithm
command in CONFIGURATION mode.
Security
931