With securing SSH servers on cisco devices, it's ideal to use SSHv2 protocol. Most software versions support SSHv2 by default, while others are bi-mode supporting
version 1 and 2 & at the same time
1:
With in cisco ASA you can test the support of sshv1 by setting the client to use SSHv1 and you can disable SSHv1 via config t ; ssh version 2
2:
With in cisco IOS routers you can test the support of sshv1 by setting the
client to use SSHv1 and you can disable SSHv1 via config t ; ip ssh
version 2
3:
With in cisco IOS-XR routers you can test the support of sshv1 by setting the
client to use SSHv1 and you can disable SSHv1 via config t ; ssh version 2 ; commit
4:
With in cisco NX-OS , " I believe SSHv2 is the only protocol supported "
It's a good time to audit your network devices and disable SSHv1, by forcing your ssh_client to use version2
Here's some screenshot of various cisco devices and ssh details
ciscoASA
cisco IOS router
cisco IOS-XR router
cisco NX-OS
( still investigating the best way and means )
Ken Felix
NSE ( Network Security Expert) and Route/Switching Engineer.
kfelix -----a----t---- socpuppets ---dot---com
^ ^
=( @ @ )=
o
/ \
No comments:
Post a Comment