Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Announcement: Try the Ask AI chatbot for answers to your technical questions about Juniper products and solutions.

close
header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Common Criteria Guide for vSRX3.0
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Configuring SSH on the Evaluated Configuration

date_range 05-Dec-23

SSH is an allowed remote management interface in the evaluated configuration. This topic describes how to configure SSH on the device.

  1. Before you begin, log in with your root account on the device running Junos OS Release 22.2R2 and edit the configuration.

Note:

The commands shown configure SSH to use all of the allowed cryptographic algorithms.

Note:

You can enter the configuration commands in any order and commit all the commands at once.

To configure SSH on the TOE:

  1. Specify the permissible SSH host-key algorithms.
    content_copy zoom_out_map
    [edit system services ssh]
    user@host# set hostkey-algorithm ssh-ecdsa
    
    Note:

    For Common Criteria compliance, use below host key algorithms : ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, and ecdsa-sha2-nistp521.

  2. Specify the command to disable rsa-sha2-512 and rsa-sha2-256 hostkey algorithms.
    content_copy zoom_out_map
    [edit system services ssh] 
    user@host# set hostkey-algorithm no-ssh-rsa 
    Note: The set system services ssh hostkey-algorithm no-ssh-rsa command will disable the rsa-sha2-512, rsa-sha2-256, and ssh-rsa hostkey algorithms.
  3. Specify the SSH key-exchange algorithms.
    content_copy zoom_out_map
    [edit system services ssh]
    user@host#set key-exchange [ ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 Diffie-hellman-group14-sha1 ]
    
  4. Specify all the permissible message authentication code algorithms.
    content_copy zoom_out_map
    [edit system services ssh]
    user@host#set macs [ hmac-sha1 hmac-sha2-256 hmac-sha2-512 ] 
    
  5. Specify the ciphers allowed for protocol version 2.
    content_copy zoom_out_map
    [edit system services ssh]
    user@host#set ciphers [ aes128-cbc aes128-ctr aes192-cbc aes192-ctr aes256-cbc aes256-ctr ]
  6. (Optional step) Specify the number of minutes or maximum amount of data, before a rekey is forced on a session. The time limit must not be set greater than one hour and the data limit must not be set greater than one gigabyte.
    content_copy zoom_out_map
    [edit system services ssh]
    user@host#set rekey time-limit minutes
    user@host#set rekey data-limit bytes
footer-navigation