Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Common Criteria Guide for SRX380 Devices
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Configuring SSH on the Evaluated Configuration

date_range 01-Jul-22

SSH is an allowed remote management interface in the evaluated configuration. This topic describes how to configure SSH on the device.

  1. Before you begin, log in with your root account on the device running Junos OS Release 22.2R1 and edit the configuration.

Note:

The commands shown configure SSH to use all of the allowed cryptographic algorithms.

Note:

You can enter the configuration commands in any order and commit all the commands at once.

To configure SSH on the TOE:

  1. Specify the permissible SSH host-key algorithms.
    content_copy zoom_out_map
    [edit system services ssh]
    user@host# set hostkey-algorithm ssh-ecdsa
    user@host# set hostkey-algorithm ssh-rsa
    
  2. Specify the SSH key-exchange algorithms.
    content_copy zoom_out_map
    [edit system services ssh]
    user@host#set key-exchange [ ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 ]
    
  3. Specify all the permissible message authentication code algorithms.
    content_copy zoom_out_map
    [edit system services ssh]
    user@host#set macs [ hmac-sha1 hmac-sha2-256 hmac-sha2-512 ] 
    
  4. Specify the ciphers allowed for protocol version 2.
    content_copy zoom_out_map
    [edit system services ssh]
    user@host#set ciphers [ aes128-cbc aes256-cbc aes128-ctr aes256-ctr ]
    
footer-navigation