Enabling Ciphers and MAC Algorithms

You can configure SSH Secure Shell. SSH is a network protocol that provides secure access to a remote device. to enable or disable the following ciphers and MAC Media Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. algorithms based on your preference:

By default, all the algorithms are enabled. However, the Gateway allows you to enable or disable a specific cipher or the HMAC-SHA1-96 authentication algorithm using the WebUI.

To enable or disable a cipher encryption, complete the following steps:

  1. Select one of the following options:
    • To select a gateway group:

      1. In the Aruba Central app, set the filter to a group that contains at least one Branch Gateway.

        The dashboard context for a group is displayed.

      2. Under Manage, click Devices > Gateways.

        A list of gateways is displayed in the List view.

      3. Click Config.

        The configuration page is displayed for the selected group.

    • To select a gateway:

      1. In the Aruba Central app, set the filter to Global or a group that contains at least one Branch Gateway.

      2. Under Manage, click Devices > Gateways.

        A list of gateways is displayed in the List view.

      3. Click a gateway under Device Name.

        The dashboard context for the gateway is displayed.

      4. Under Manage, click Device.

        The gateway device configuration page is displayed.

  2. Click System > Admin > Admin Authentication Options.
  3. Under SSH (Secure Shell) Authentication Method, make the following changes:
    • Select an encryption method by selecting AES-CBC, AES-CTR, or Both as the encryption option.
    • Select an authentication key by selecting HMAC-SHA1, HMAC-SHA1-96, or HMAC-SHA2-96 as authentication keys.
    • Select the Idle session timeout for the gateway device by entering a decimal number for session timeout, and select minutes or seconds from the drop-down list.
  4. Click Save Settings.

The following animation shows you how to configure SSH authentication for CLI access.