Legal Disclaimer: The resource assets in this website may include abbreviated and/or legacy terminology for HPE Aruba Networking products. See www.arubanetworks.com for current and complete HPE Aruba Networking product lines and names.
Enabling Ciphers and MAC Algorithms
You can configure SSH Secure Shell. SSH is a network protocol that provides secure access to a remote device. to enable or disable the following ciphers and MAC Media Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. algorithms based on your preference:
- AES Advanced Encryption Standard. AES is an encryption standard used for encrypting and protecting electronic data. The AES encrypts and decrypts data in blocks of 128 bits (16 bytes), and can use keys of 128 bits, 192 bits, and 256 bits.-CBC
- AES-CTR
- HMAC-SHA1
- MAC-SHA1-96
By default, all the algorithms are enabled. However, the Gateway allows you to enable or disable a specific cipher or the HMAC-SHA1-96 authentication algorithm using the WebUI.
To enable or disable a cipher encryption, complete the following steps:
- Select one of the following options:
-
To select a gateway group:
-
In the HPE Aruba Networking Central app, set the filter to a group that contains at least one Branch Gateway.
The dashboard context for a group is displayed.
-
Under
, click > .A list of gateways is displayed in the List view.
-
Click
.The configuration page is displayed for the selected group.
-
-
To select a gateway:
-
In the HPE Aruba Networking Central app, set the filter to Global or a group that contains at least one Branch Gateway.
-
Under
, click > .A list of gateways is displayed in the List view.
-
Click a gateway under
.The dashboard context for the gateway is displayed.
-
Under
, click .The gateway device configuration page is displayed.
-
- Click > > .
- Under
- Select an encryption method by selecting , , or as the encryption option.
- Select an authentication key by selecting HMAC-SHA1, HMAC-SHA1-96, or HMAC-SHA2-96 as authentication keys.
- Select the Idle session timeout for the gateway device by entering a decimal number for session timeout, and select minutes or seconds from the drop-down list.
, make the following changes: - Click .
The following animation shows you how to configure SSH authentication for CLI access.