| Description |
This article describes how to retrieve the list of algorithms and ciphers FortiNAC uses for SSH communication with network devices. This is done using the CLI.
It is suggested to log the session output to a text file for review later. For FortiNAC servers running on CentOS, see article 228553 |
| Scope |
FortiNAC-F, vF7.x |
| Solution |
FortiNAC vF7.2, vF7.4:
diagnose debug logger set finest org.apache.sshd diagnose tail -F output.master
FortiNAC vF7.6 +:
diagnose debug logger set trace org.apache.sshd diagnose tail -F output.master
diagnose debug logger unset org.apache.sshd
Kex algorithms:
org.apache.sshd.client.session.ClientSessionImpl FINEST :: 2025-01-23 13:21:56:310 :: #1141 :: negotiate(ClientSessionImpl[admin@/192.168.2.1:22])[kex algorithms] guess=diffie-hellman-group14-sha256 (client=diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group14-sha256,diffie-hellman-group15-sha512,diffie-hellman-group16-sha512,diffie-hellman-group17-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group-exchange-sha256,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,curve25519-sha256,curve25519-sha256@libssh.org,curve448-sha512,ext-info-c / server=diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521)
Ciphers (encryption algorithms):
org.apache.sshd.client.session.ClientSessionImpl FINEST :: 2025-01-23 13:21:56:310 :: #1141 :: negotiate(ClientSessionImpl[admin@/192.168.2.1:22])[encryption algorithms (client to server)] guess=aes256-ctr (client=chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc / server=aes256-ctr,aes256-gcm@openssh.com)
MAC Algorithms:
org.apache.sshd.client.session.ClientSessionImpl FINEST :: 2025-01-23 13:21:56:310 :: #1141 :: negotiate(ClientSessionImpl[admin@/192.168.2.1:22])[mac algorithms (client to server)] guess=hmac-sha2-256-etm@openssh.com (client=hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 / server=hmac-sha2-256,hmac-sha2-256-etm@openssh.com,hmac-sha2-512,hmac-sha2-512-etm@openssh.com)
The following are supported as of FortiNAC versions F 7.2.8, F 7.4.1 and F 7.6.1.
--Kex--
--Ciphers--
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.