Manual Chapter :
Creating an SSH Security Configuration
Applies To:
Show VersionsBIG-IP APM
- 17.1.0, 17.0.0, 16.1.5, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0, 16.0.1, 16.0.0
Creating an SSH Security Configuration
It is important to understand the backend
server requirements regarding SSH.
You need an SSH Security Configuration to
configure privileged user access. The SSH Security Configuration defines the ciphers,
exchange methods, HMACs, and compression algorithms required by the backend resource.
You can use the default configuration
ssh-security-config
which is
provided on the system. - On the Main tab, click.
- ClickCreate.
- ForName, type a name for the SSH security configuration.
- ForCiphers, select the encryption methods to use from theAvailablelist and move them into theSelectedlist.
- ForKey Exchange Methods, select the methods to use from theAvailablelist and move them into theSelectedlist.The Key Exchange method is used to establish secure communications for exchanging data.
- ForHMACs, select the hash-based message authentication codes to use from theAvailablelist and move them into theSelectedlist.
- ForCompression Algorithms, select the algorithm orNonefrom theAvailablelist and move it into theSelectedlist.The default isNonewhich avoids unnecessary compression. However, some backend servers use zlib* compression. In this case, chosezliborzlib-opensshwhichever is appropriate.
- ClickSave.
The SSH Security Configuration is added to the
list.
Next, create an Access
Configuration.