You use the security ssh commands to manage the SSH security configurations of a cluster or Storage Virtual Machines (SVMs), including displaying, replacing, adding, removing, and restoring the SSH key exchange algorithms and data encryption algorithms (ciphers).
|If you want to...||Use this command...|
|Display the current configurations of the SSH key exchange algorithms and ciphers for the cluster and SVMs||security ssh show|
|Replace the current configurations of the SSH key exchange algorithms or ciphers for the cluster or SVM with the configuration settings you specify||security ssh modify|
|Add SSH key exchange algorithms or ciphers to the current configurations for the cluster or SVM||security ssh add|
|Remove the specified SSH key exchange algorithms or ciphers from the current configurations of the cluster or SVM||security ssh remove|
|Restore the configurations of SSH key exchange algorithms and ciphers of the cluster and all SVMs to the settings that were used prior to Data ONTAP 8.2.1||security ssh prepare-to-downgrade
(advanced privilege level)
Data ONTAP prompts you to run this command if you downgrade or revert to a release earlier than Data ONTAP 8.2.1.