Table of ContentsView in Frames

Commands for managing SSH security configurations

You use the security ssh commands to manage the SSH security configurations of a cluster or Storage Virtual Machines (SVMs), including displaying, replacing, adding, removing, and restoring the SSH key exchange algorithms and data encryption algorithms (ciphers).

If you want to... Use this command...
Display the current configurations of the SSH key exchange algorithms and ciphers for the cluster and SVMs security ssh show
Replace the current configurations of the SSH key exchange algorithms or ciphers for the cluster or SVM with the configuration settings you specify security ssh modify
Add SSH key exchange algorithms or ciphers to the current configurations for the cluster or SVM security ssh add
Remove the specified SSH key exchange algorithms or ciphers from the current configurations of the cluster or SVM security ssh remove
Restore the configurations of SSH key exchange algorithms and ciphers of the cluster and all SVMs to the settings that were used prior to Data ONTAP 8.2.1 security ssh prepare-to-downgrade

(advanced privilege level)

Data ONTAP prompts you to run this command if you downgrade or revert to a release earlier than Data ONTAP 8.2.1.