Your browser does not allow storing cookies. We recommend enabling them.

SSH

Host Keys

To enable ECDSA host-key algorithms for Tectia Client, do the following:

  1. In the Tectia Connections Configuration GUI, go to General > Default Connection > Server and clear the Use factory defaults check box.

  2. Move ecdsa-sha2-nistp256, ecdsa-sha2-nistp384 and ecdsa-sha2-nistp521 to the Enabled Hostkey Algorithms list.

    Enabling elliptic curve host-key algorithms for Tectia Client

    Figure 2.3. Enabling elliptic curve host-key algorithms for Tectia Client

  3. Once you have enabled the ECDSA host-key algorithms, you can change the order of the list using the red up and down arrow buttons. Tectia Client reads the list in the top-down order.

  4. Click Apply.

[Note]Note

To enable ECDSA host keys for X.509, repeat the process described above but select the algorithms named x509v3-ecdsa-sha2-*.


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now