In the storage cluster’s SSH security configuration, both weak and strong Ciphers, Key Exchange Algorithms, and MAC Algorithms are active.
Summary:
Remove weak ciphers, key exchange algorithms, and MAC algorithms from storage clusters and associated end devices.
In-depth:
In storage clusters, both weak and strong Ciphers, Key Exchange Algorithms, and MAC Algorithms are active. It is best advised and recommended to allow/ keep strong ciphers, key exchange algorithms, and MAC algorithms only for SSH connections. And remove weak ones from cluster SSH security configurations due to SSH high-security connections and be followed across all the other the infrastructure devices like OS, network, servers (physical and virtual), and storage.