Table of ContentsView in Frames

Managing SSH security configurations

Managing SSH security configurations involves managing the SSH key exchange algorithms and data encryption algorithms (also known as ciphers). Data ONTAP enables you to enable or disable individual SSH key exchange algorithms and ciphers for the cluster or Storage Virtual Machines (SVMs) according to their SSH security requirements.

Data ONTAP supports the following SSH security configurations for the cluster and SVMs:

You can manage the SSH key exchange algorithms and ciphers for the cluster and SVMs in the following ways: