11 - Managing SSHv2 - MAC Algorithms

Information

Recommendations:

- Use passwords for user sessions.
- Use a public key for machine access.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

The security ssh modify command replaces the existing configurations of the SSH key exchange algorithms, ciphers, or MAC algorithms for the cluster or an SVM with the configuration settings you specify.

See Also

https://www.netapp.com/us/media/tr-4569.pdf