Created on
10-19-2023
10:10 PM
Edited on
11-14-2024
04:16 PM
By
_mribwan
Description |
This article describes how SSH server host key algorithms can be changed on FortiGate. |
Scope |
FortiGate v7.4. |
Solution |
Starting v7.4.0 FortiGate has the capability to change the SSH server host key algorithms offered by FortiGate as SSH Server.
By default, FortiGate uses all the algorithm keys:
The same can be verified in the Wireshark capture as below:
SSH server host key algorithms can be modified on FortiGate.
Multiple ssh-host key-algo server keys can be set on FortiGate.
To disable certain cipher, unselect it by running the following command:
unselect ssh-kex-algo (cipher to be removed)
Example:
Gerah-kvm05 # conf sys global Gerah-kvm05 (global) # sh full | grep ssh-kex-algo Gerah-kvm05 (global) # unselect ssh-kex-algo ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 Gerah-kvm05 (global) # sh full | grep ssh-kex-algo Gerah-kvm05 # end
It is also possible to verify in the PCAP.
After disabling strong-crypto, the ssh-hostkey-algo will also display the ssh-rsa option:
For v7.4.4 and later, the ssh-hostkey-algo command has been moved from the config system global setting to the config system ssh-config setting.
config system ssh-config |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.