For command line scanning of DH parameters, give this a try: https://github.com/GDSSecurity/SSH-Weak-DH
For those curious, strong-crypto=yes enables 2048 bit DH parameters and disables 3des / md5 from ciphers / HMAC but dsa keys and sha1 remain enabled.
/ip ssh set strong-crypto=yes:
[+] STRONG. Algorithm: diffie-hellman-group-exchange-sha256. Negotiated group size in bits: 2048. Group size proposed by client in bits: min=2048, nbits=8192, max=8192.
[+] STRONG. Algorithm: diffie-hellman-group-exchange-sha256. Negotiated group size in bits: 2048. Group size proposed by client in bits: min=2048, nbits=2048, max=2048.
[+] STRONG. Algorithm: diffie-hellman-group-exchange-sha1. Negotiated group size in bits: 2048. Group size proposed by client in bits: min=2048, nbits=8192, max=8192.
[+] STRONG. Algorithm: diffie-hellman-group-exchange-sha1. Negotiated group size in bits: 2048. Group size proposed by client in bits: min=2048, nbits=2048, max=2048.
[+] STRONG. Algorithm: diffie-hellman-group-exchange-sha256. Negotiated group size in bits: 2048. Group size proposed by client in bits: min=2048, nbits=8192, max=8192.
[+] STRONG. Algorithm: diffie-hellman-group-exchange-sha256. Negotiated group size in bits: 2048. Group size proposed by client in bits: min=2048, nbits=2048, max=2048.
/ip ssh set strong-crypto=no:
[+] STRONG. Algorithm: diffie-hellman-group-exchange-sha256. Negotiated group size in bits: 2048. Group size proposed by client in bits: min=2048, nbits=8192, max=8192.
[*] INTERMEDIATE (might be feasible to break for nation-states). Algorithm: diffie-hellman-group-exchange-sha256. Negotiated group size in bits: 1024. Group size proposed by client in bits: min=1024, nbits=1024, max=1024.
[+] STRONG. Algorithm: diffie-hellman-group-exchange-sha256. Negotiated group size in bits: 2048. Group size proposed by client in bits: min=2048, nbits=2048, max=2048.
[+] STRONG. Algorithm: diffie-hellman-group-exchange-sha1. Negotiated group size in bits: 2048. Group size proposed by client in bits: min=2048, nbits=8192, max=8192.
[*] INTERMEDIATE (might be feasible to break for nation-states). Algorithm: diffie-hellman-group-exchange-sha1. Negotiated group size in bits: 1024. Group size proposed by client in bits: min=1024, nbits=1024, max=1024.
[+] STRONG. Algorithm: diffie-hellman-group-exchange-sha1. Negotiated group size in bits: 2048. Group size proposed by client in bits: min=2048, nbits=2048, max=2048.
[+] STRONG. Algorithm: diffie-hellman-group-exchange-sha256. Negotiated group size in bits: 2048. Group size proposed by client in bits: min=2048, nbits=8192, max=8192.
[*] INTERMEDIATE (might be feasible to break for nation-states). Algorithm: diffie-hellman-group-exchange-sha256. Negotiated group size in bits: 1024. Group size proposed by client in bits: min=1024, nbits=1024, max=1024.
[+] STRONG. Algorithm: diffie-hellman-group-exchange-sha256. Negotiated group size in bits: 2048. Group size proposed by client in bits: min=2048, nbits=2048, max=2048.
[*] INTERMEDIATE (might be feasible to break for nation-states). Algorithm: diffie-hellman-group1-sha1. Negotiated group size in bits: 1024. Group size proposed by client in bits: min=1024, nbits=1024, max=1024.
Note this output is only about the DH parameters, cipher choices / HMACs are still weak compared to a modern SSH server.