Configuring SSHD to limit access to your deployment
How to configure SSHD in order to limit host access to your VMware deployment.
About this task
The following example shows how to configure SSHD in order to limit VMware access to a certain set of IP addresses.
Attention:
- SSHD configuration settings are not included in the IBM® API Connect backups. However, the settings are kept when you upgrade to a new fix pack.
- If you change the SSHD cipher level, and encounter issues with the new configuration, you must revert your cipher changes and retest. If after the retest you still have issues, contact IBM Support.
Procedure
Results
Access to your VMware is now limited to a certain set of IP addresses.
What to do next
If you want to remove a cipher from your SSHD configuration, you can edit the
/etc/ssh/sshd_config file. For example, if your security department decides
that you must stop using the 128 bit UMAC cipher, you can remove it from your supported ciphers list
by editing the
/etc/ssh/sshd_config
file and changing the following line
from:MACs hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com
to:MACs hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512,hmac-sha2-256
Then restart the SSHD service by running the following
command:systemctl restart sshd.service