Users Guide

Table Of Contents
tty1
tty2
tty3
tty4
tty5
tty6
tty7
tty8
tty9
tty10
tty11
ttyS1
Supported SSH cryptography schemes
To communicate with iDRAC using SSH protocol, it supports multiple cryptography schemes listed in the following table.
Table 15. SSH cryptography schemes
Scheme Type Algorithms
Asymmetric Cryptography
Public key
ssh-rsa
ecdsa-sha2-nistp256
Symmetric Cryptography
Key Exchange
curve25519-sha256@libssh.org
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
diffie-hellman-group-exchange-sha256
diffie-hellman-group14-sha1
Encryption
chacha20-poly1305@openssh.com
aes128-ctr
aes192-ctr
aes256-ctr
aes128-gcm@openssh.com
aes256-gcm@openssh.com
MAC
hmac-sha1
hmac-ripemd160
umac-64@openssh.com
Compression None
NOTE: If you enable OpenSSH 7.0 or later, DSA public key support is disabled. To ensure better security for iDRAC, Dell
recommends not enabling DSA public key support.
Using public key authentication for SSH
iDRAC supports the Public Key Authentication (PKA) over SSH. This is a licensed feature. When the PKA over SSH is set up
and used correctly, you must enter the user name while logging into iDRAC. This is useful for setting up automated scripts that
Setting up iDRAC communication
121