![]() | Oracle System Handbook - ISO 7.0 May 2018 Internal/Partner Edition | ||
|
|
![]() |
||||||||||||||
Solution Type Technical Instruction Sure Solution 2233005.1 : How to Configure the Ciphers, KEX, and MAC Algorithms on Brocade Switches.
In this Document
Applies to:Brocade 300 Switch - Version All Versions to All Versions [Release All Releases]Brocade 6510 Fabric Switch - Version All Versions to All Versions [Release All Releases] Brocade 6520 Switch - Version All Versions to All Versions [Release All Releases] Information in this document applies to any platform. GoalStarting with Fabric OS version 7.4, a new command secCryptoCfg was introduced to configure the ciphering for Brocade switches. You can check the current ciphering by running: BrocadeSwitch:admin>secCryptoCfg --show HTTPS Cipher List : !ECDH:!DH:HIGH:-MD5:!CAMELLIA:!SRP:!PSK:!AESGCM
Here we see that, for example, for the SSH cipher list we have CBC algorithms configured and for the SSH MACs list we have md5, sha1 and sha2. To check the complete list of the available ciphering algorithms, please consult the Brocade CLI guide. SolutionAs a working example, the following command will remove the CBC ciphering ( considered weak ) and replaced it with CTR: BrocadeSwitch:admin> seccryptocfg --replace -type SSH -cipher aes128-ctr,aes192-ctr This command requires the daemon(s) SSH to be restarted After the SSH services are restarted, you can use the --show option again to verify the changes: BrocadeSwitch:admin > seccryptocfg --show
For further information, please refer the FabOS 7.4 Admin Guide.
Attachments This solution has no attachment |
||||||||||||||
|