ciphers
Configures the cipher priority list in SSH client symmetric encryption that is used to generate an SSH client key pair.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > SSH Client Configuration
configure > client ssh
Entering the above command results in the following prompt:
[context_name]host_name(config-ssh)#
Syntax
[ default ] ciphers algorithm
default
aes256-ctr,aes192-ctr,aes128-ctr,aes256-gcm@openssh.com,aes128-gcm@openssh.com,chacha20-poly1305@openssh.com,
blowfish-cbc,3des-cbc,aes128-cbc
aes256-ctr,aes192-ctr,aes128-ctr
algorithm
Specifies the algorithm(s) to be used as a single string of comma-separated variables (no spaces) in priority order from those shown below:
-
blowfish-cbc – symmetric-key block cipher, Cipher Block Chaining, CBC
-
3des-cbc – Triple Data Encryption Standard, CBC
-
aes128-cbc – Advanced Encryption Standard, 128-bit key size, CBC
-
aes128-ctr –Advanced Encryption Standard, 128-bit key size, Counter-mode encryption, CTR
-
aes192-ctr – Advanced Encryption Standard, 192-bit key size, CTR
-
aes256-ctr – Advanced Encryption Standard, 256-bit key size, CTR
-
aes128-gcm@openssh.com – Advanced Encryption Standard, 128-bit key size, Galois Counter Mode [GCM], OpenSSH
-
aes256-gcm@openssh.com – Advanced Encryption Standard, 256-bit key size, GCM, OpenSSH
-
chacha20-poly1305@openssh.com – ChaCha20 symmetric cipher, Poly1305 cryptographic Message Authentication Code [MAC], OpenSSH
algorithm is a string of 1 through 511 alphanumeric characters.
Important |
For release 20.0 and higher Trusted builds, only the AES128-CTR, AES-192-CTR and AES-256CTR ciphers are available. |
Usage Guidelines
Use this command to configure the cipher priority list for SSH client symmetric encryption that is used to generate an SSH client key pair.
Example
ciphers blowfish-cbc,aes128-cbc,aes128-ctr,aes192-ctr,aes256-ctr