Friday, February 6, 2015

SSH v2 security cisco devices ( ASA / ROUTER / SWITCH )

With securing SSH servers on cisco devices, it's ideal to use SSHv2 protocol. Most software versions support SSHv2 by default, while others are bi-mode supporting
version 1 and 2 & at the same time

1:
With in cisco ASA you can test the support of  sshv1  by setting the client to  use SSHv1 and you can disable SSHv1 via config t ; ssh version 2

2:
 
With in cisco IOS routers you can test the support of  sshv1  by setting the client to  use SSHv1 and you can disable SSHv1 via config t ; ip ssh version 2

3:
With in cisco IOS-XR routers you can test the support of  sshv1  by setting the client to  use SSHv1 and you can disable SSHv1 via config t ; ssh version 2 ; commit

4:
With in cisco NX-OS " I believe SSHv2 is the only protocol supported "

It's a good time to audit your network devices and disable SSHv1, by forcing your ssh_client to use version2


Here's some screenshot of various cisco devices and ssh details


ciscoASA


cisco IOS router


cisco IOS-XR router



cisco NX-OS
( still investigating the best way  and means )


Ken Felix
NSE ( Network Security Expert) and Route/Switching Engineer.
kfelix  -----a----t---- socpuppets ---dot---com

     ^      ^
=(  @  @ )=
         o 
        /  \

No comments:

Post a Comment