<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issue SSH in Routing and SD-WAN</title>
    <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205244#M110631</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your old IOS contains only the Server function for SSHv2. &lt;BR /&gt;You can´t operate as a client with this IOS when SSHv2 is enabled&lt;BR /&gt;With SSHv1 you can operate both as a server and as a client.&lt;BR /&gt;Your new IOS also offers only the same function of SSHv1 and SSHv2 like your old IOS&lt;BR /&gt;Still it is not possible with SSHv2 to operate as a client.&lt;/P&gt;&lt;P&gt;You need a newer IOS. The Cisco IOS Releases 15.0(2)SG (Catalyst 4500 Series Switch) contains Secure Shell SSHv2 Client and Server Support&lt;/P&gt;&lt;P&gt;You need a crypto key with at least 768 bit to enable SSHv2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for additional questions look here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/release/note/OL_24727.html" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/release/note/OL_24727.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Check your current IOS features with the Cisco Feature Navigator:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://tools.cisco.com/ITDIT/CFN/jsp/SearchBySoftware.jsp" rel="nofollow"&gt;http://tools.cisco.com/ITDIT/CFN/jsp/SearchBySoftware.jsp&lt;/A&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 29 Nov 2013 16:16:57 GMT</pubDate>
    <dc:creator>andacn001</dc:creator>
    <dc:date>2013-11-29T16:16:57Z</dc:date>
    <item>
      <title>Issue SSH</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205236#M110623</link>
      <description>&lt;P&gt;I did upgrade to version of IOS  cat4000-i9k91s-mz.122-18.EW2.bin to cat4500-entservicesk9-mz.122-52.SG.bin  at a catalyst  4507r engine IV.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before i could to execute:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh 1.1.1.1, without problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But after upgrade i can't do that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In catalyst 4507r:&lt;/P&gt;&lt;P&gt;-----------------&lt;/P&gt;&lt;P&gt;router_4507r#sh ip ssh&lt;/P&gt;&lt;P&gt;SSH Enabled - version 1.99&lt;/P&gt;&lt;P&gt;Authentication timeout: 120 secs; Authentication retries: 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;router_4507r#ssh 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Connection to 1.1.1.1 aborted: error status 0]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In router remote:&lt;/P&gt;&lt;P&gt;----------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router_remote#sh ip ssh&lt;/P&gt;&lt;P&gt;SSH Enabled - version 1.99&lt;/P&gt;&lt;P&gt;Authentication timeout: 120 secs; Authentication retries: 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Mar 2019 12:58:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205236#M110623</guid>
      <dc:creator>pesanchez2002</dc:creator>
      <dc:date>2019-03-04T12:58:42Z</dc:date>
    </item>
    <item>
      <title>Re: Issue SSH</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205237#M110624</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try ssh -l [username] 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;__&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edison.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jun 2009 12:47:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205237#M110624</guid>
      <dc:creator>Edison Ortiz</dc:creator>
      <dc:date>2009-06-03T12:47:00Z</dc:date>
    </item>
    <item>
      <title>Re: Issue SSH</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205238#M110625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi thanks by your answer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I executed the command &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh -l username 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and receive the same message&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Connection to 1.1.1.1 aborted: error status 0]&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jun 2009 14:44:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205238#M110625</guid>
      <dc:creator>pesanchez2002</dc:creator>
      <dc:date>2009-06-03T14:44:40Z</dc:date>
    </item>
    <item>
      <title>Re: Issue SSH</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205239#M110626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can we see the complete configuration on both devices?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you ping 1.1.1.1 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you verify you have enough VTY sessions available? (show users).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;__&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edison.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jun 2009 14:48:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205239#M110626</guid>
      <dc:creator>Edison Ortiz</dc:creator>
      <dc:date>2009-06-03T14:48:29Z</dc:date>
    </item>
    <item>
      <title>Re: Issue SSH</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205240#M110627</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes i can do ping 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can do ssh connection with my Computer using putty in my computer without problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have 3 possible connection vty:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 2&lt;/P&gt;&lt;P&gt; session-timeout 3&lt;/P&gt;&lt;P&gt; access-class 51 in&lt;/P&gt;&lt;P&gt; exec-timeout 3 0&lt;/P&gt;&lt;P&gt; timeout login response 15&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; transport input ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had no problem to connect before carrying out the upgrade of IOS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jun 2009 15:24:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205240#M110627</guid>
      <dc:creator>pesanchez2002</dc:creator>
      <dc:date>2009-06-03T15:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: Issue SSH</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205241#M110628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then the problem can be IOS related. Try a earlier version than the one you currently have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;__&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edison.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jun 2009 15:33:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205241#M110628</guid>
      <dc:creator>Edison Ortiz</dc:creator>
      <dc:date>2009-06-03T15:33:51Z</dc:date>
    </item>
    <item>
      <title>Re: Issue SSH</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205242#M110629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;maybe it's still helpful. i had the same issue. check the version of ssh configured on 1.1.1.1.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I have two switches (2950, same IOS etc), destination switch configured with ip ssh version 2. when trying to ssh from switch one to that it gives me error message, even though when showing ssh both seem to run ssh version 2 ok. But when I take the command out they connect on ssh 1.5. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;So I guess you can either take the command out or put it in on the other switch (if supported). &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Then you might have different switches altogether by now. &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Nov 2010 10:00:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205242#M110629</guid>
      <dc:creator>ahintzsche</dc:creator>
      <dc:date>2010-11-02T10:00:40Z</dc:date>
    </item>
    <item>
      <title>Issue SSH</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205243#M110630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had a similar case:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;+++++++++++++++++++++++++++++++++++++++++++++++++++&lt;BR /&gt;Error reported by the customer:&lt;/P&gt;&lt;P&gt;Router2#ssh -l userID x.x.x.x&lt;/P&gt;&lt;P&gt;[Connection to x.x.x.x aborted: error status 0]&lt;BR /&gt;Router2#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Resolution:&lt;/P&gt;&lt;P&gt;Enabled on x.x.x.x router:&lt;/P&gt;&lt;P&gt;conf t&lt;BR /&gt;crypto key generate rsa&lt;BR /&gt;1024&lt;/P&gt;&lt;P&gt;Devices is reachable from Router2 now:&lt;/P&gt;&lt;P&gt;------------------------------------------------------&lt;BR /&gt;Router2#ssh -l userID x.x.x.x&lt;/P&gt;&lt;P&gt;Password:&lt;BR /&gt;+++++++++++++++++++++++++++++++++++++++++++++++++++&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Aug 2013 22:58:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205243#M110630</guid>
      <dc:creator>famfran13</dc:creator>
      <dc:date>2013-08-08T22:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: Issue SSH</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205244#M110631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your old IOS contains only the Server function for SSHv2. &lt;BR /&gt;You can´t operate as a client with this IOS when SSHv2 is enabled&lt;BR /&gt;With SSHv1 you can operate both as a server and as a client.&lt;BR /&gt;Your new IOS also offers only the same function of SSHv1 and SSHv2 like your old IOS&lt;BR /&gt;Still it is not possible with SSHv2 to operate as a client.&lt;/P&gt;&lt;P&gt;You need a newer IOS. The Cisco IOS Releases 15.0(2)SG (Catalyst 4500 Series Switch) contains Secure Shell SSHv2 Client and Server Support&lt;/P&gt;&lt;P&gt;You need a crypto key with at least 768 bit to enable SSHv2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for additional questions look here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/release/note/OL_24727.html" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/release/note/OL_24727.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Check your current IOS features with the Cisco Feature Navigator:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://tools.cisco.com/ITDIT/CFN/jsp/SearchBySoftware.jsp" rel="nofollow"&gt;http://tools.cisco.com/ITDIT/CFN/jsp/SearchBySoftware.jsp&lt;/A&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Nov 2013 16:16:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205244#M110631</guid>
      <dc:creator>andacn001</dc:creator>
      <dc:date>2013-11-29T16:16:57Z</dc:date>
    </item>
    <item>
      <title>Hi pesanchez2002,</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205245#M110632</link>
      <description>&lt;P&gt;Hi pesanchez2002,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So, although the post is old, I presented the same issue. I saw that my two routers had different version for ssh.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;R1#ssh -l cisco 10.12.0.2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;[Connection to 10.12.0.2 aborted: error status 0]&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;R1#&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;R1#sh ip ssh &lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;SSH Enabled - version 1.5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Authentication timeout: 120 secs; Authentication retries: 3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Minimum expected Diffie Hellman key size : 1024 bits&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;IOS Keys in SECSH format(ssh-rsa, base64 encoded):&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAQQCn6ikgcwMwN2ifgWa2rqf/kQFUZnN5+k/XsXXDjV0e&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;VomwDnPVVTSRBtZR2nEhPRg+Tq9EjF8F8ejB/kewfVob &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;R1#&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;R2(config-line)#do sh ip ssh &lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;SSH Enabled - version 2.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Authentication timeout: 120 secs; Authentication retries: 3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Minimum expected Diffie Hellman key size : 1024 bits&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;IOS Keys in SECSH format(ssh-rsa, base64 encoded):&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDvQVznsveLrgk6vMsR3a5BwYPj2vaBPHRttVY6saE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;SQ8E0x4HU1rbn94tzjgLQKVvlc4D9dNam1JIw7A07PS6vxoW0NZTXTMRMF+muEmzaWJkpZq5JUwK18Oa&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;gqToXWyCjqPAn8Hp+ZgInRynXkMudsKVQfSMHKhB3Z7Lua9oO0COv+WJ+74Ci6ipxMWjethQVT6jCQ8u&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;MkprhOPQx/haQGe2cilIcfHcSmsrGi0DbyTZxVxaqlgfLZzhttMkCg5UYpxCan3BSWxjb4kTs36Wb8Np&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;6uEZzvDmolHXLG+8V6P6bMAeBB3KLpC3sfHmWEHwcbVN3UAvAeXY8o4sCzdf &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;R2(config-line)#&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;/P&gt;
&lt;P class="p1"&gt;My solution was to bring equal the version for ssh in the two equipments.&lt;/P&gt;
&lt;P class="p1"&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;R1(config)#ip ssh version 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;R1#sh ip ssh &lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;SSH Enabled - version 2.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Authentication timeout: 120 secs; Authentication retries: 3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Minimum expected Diffie Hellman key size : 1024 bits&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;IOS Keys in SECSH format(ssh-rsa, base64 encoded):&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDnfzqredbdnDrI3BB4G/YcKupR29oRPS3pyxrseEaY&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;LgmZ59K3NAfriL8LGCa15iZQ4nbRb/OARRTJhP+W2km24kfUEqP6n7BQf4VSaPTAx3RdycV2c+6EoOPp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;auDeosPfUn+AD8VmUs1vrk+cHusBdnjIS7PRFaq2TQ7TWJTj+sDsoqLxfmoD5bKb8Y/MFtIKULnsrZiS&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;hjAA2c3HuiqozVSVU+SW+wHAUYJtat28B3zFA65C0HHsoQSnGGFO+U4W9HHXTNFN6n9Ut2fsoRxagZ54&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;DbaMN9DyoI2jaWlZV1szO8JOUIuzC1TrnXZvxMEJK55ZHOfRO1rq3cVVwYX7 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;R1#&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;R1#ssh -l admin 10.12.0.2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Password: &lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;R2#&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;R2#&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I hope that this information help to other people with the same issue.&lt;/P&gt;
&lt;P&gt;Note. Sorry for my english, I'm still learning.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 03 Apr 2017 09:55:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/1205245#M110632</guid>
      <dc:creator>andreslgx_101</dc:creator>
      <dc:date>2017-04-03T09:55:41Z</dc:date>
    </item>
    <item>
      <title>Re: Hi pesanchez2002,</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/3324304#M291431</link>
      <description>&lt;P&gt;I would like to continue this thread. The above resolution regarding version 2 and client server does not seem to be relevant in my case.&amp;nbsp; I have not checked the release notes or software features at this point but here is what I have.&lt;/P&gt;
&lt;P&gt;I have a 3850 new out of the box. It is running 16.6.1. It cannot ssh to any ASA5525. The version on the ASA is 9.8(1). The 3850 can ssh fine to other Cisco devices. Examples include a 4331. Another 3850. 4500X. N7K, all work fine and all configured with ip ssh version 2. The modulus of all keys is 1024 or better.&lt;/P&gt;
&lt;P&gt;Older versions of 3850 can ssh into the ASA fine. Other switches can ssh to the ASA just fine. Putty works fine. I have other ASA's of the same version and this 3850 cannot ssh to any of them. Thinking this might be a bug.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 18:22:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/3324304#M291431</guid>
      <dc:creator>Garry Cross</dc:creator>
      <dc:date>2018-02-02T18:22:07Z</dc:date>
    </item>
    <item>
      <title>Re: Issue SSH</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/3324591#M291456</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;zerosize the ssh key and recreate it&lt;/P&gt;
&lt;P&gt;also allow ssh on all vty lines not just 0 2 test again&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;res&lt;/P&gt;
&lt;P&gt;paul&lt;/P&gt;</description>
      <pubDate>Sat, 03 Feb 2018 16:31:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/3324591#M291456</guid>
      <dc:creator>paul driver</dc:creator>
      <dc:date>2018-02-03T16:31:46Z</dc:date>
    </item>
    <item>
      <title>Re: Issue SSH</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/3325419#M291501</link>
      <description>&lt;P&gt;Not sure if this was a response to my post but I don't see how it is relevant to my situation if it was.&lt;/P&gt;
&lt;P&gt;ASA has no concept of line vty ... and on the 3850 all vty lines are set to transport input ssh of which this is not input but output.&lt;/P&gt;
&lt;P&gt;I think I found the issue.&lt;/P&gt;
&lt;P&gt;After debug ssh I see this message.&lt;/P&gt;
&lt;P&gt;SSH2 0: kex algo not supported: client diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, server diffie-hellman-group&amp;nbsp;&amp;nbsp; Unfortunately the message is cutoff from display.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ASA comes by default with&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ssh key-exchange group dh-group1-sha1 &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Changing to&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ssh key-exchange group dh-group14-sha1&lt;/STRONG&gt; (the only other choice)&lt;/P&gt;
&lt;P&gt;and now the 3850 on Version 16.6.1 can connect to the ASA with SSH.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The 16.6.1 3850 has a new configuration item&lt;/P&gt;
&lt;P&gt;ip ssh client ?&lt;/P&gt;
&lt;P&gt;encryption&lt;/P&gt;
&lt;P&gt;kex&lt;/P&gt;
&lt;P&gt;mac&lt;/P&gt;
&lt;P&gt;ip ssh client kex ?&lt;/P&gt;
&lt;P&gt;diffie-hellman-group-exhange-sha1&lt;/P&gt;
&lt;P&gt;diffie-hellman-group14-sha1&lt;/P&gt;
&lt;P&gt;The 3.3.3SE release does not have such an option on ip ssh.&lt;/P&gt;
&lt;P&gt;So there are changes in the code of 16.6.1 when it comes to ssh protocol.&lt;/P&gt;
&lt;P&gt;At this point the ASA does not seem to understand what diffie-hellman-group-exhange-sha1 is.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Feb 2018 16:33:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/3325419#M291501</guid>
      <dc:creator>Garry Cross</dc:creator>
      <dc:date>2018-02-05T16:33:02Z</dc:date>
    </item>
    <item>
      <title>Re: Issue SSH</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/3762418#M305944</link>
      <description>&lt;P&gt;I have same problem on Cisco ASR920.&lt;BR /&gt;ACR903#&lt;STRONG&gt;show ip ssh&lt;/STRONG&gt;&lt;BR /&gt;SSH Enabled - version 1.99&lt;BR /&gt;Authentication methods:publickey,keyboard-interactive,password&lt;BR /&gt;Authentication Publickey Algorithms:x509v3-ssh-rsa,ssh-rsa&lt;BR /&gt;Hostkey Algorithms:x509v3-ssh-rsa,ssh-rsa&lt;BR /&gt;Encryption Algorithms:&lt;STRONG&gt;aes128-ctr,aes192-ctr,aes256-ctr&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASR920#&lt;STRONG&gt;show ip ssh&lt;/STRONG&gt;&lt;BR /&gt;SSH Enabled - version 1.99&lt;BR /&gt;Authentication methods:publickey,keyboard-interactive,password&lt;BR /&gt;Authentication Publickey Algorithms:x509v3-ssh-rsa,ssh-rsa&lt;BR /&gt;Hostkey Algorithms:x509v3-ssh-rsa,ssh-rsa&lt;BR /&gt;Encryption Algorithms:&lt;STRONG&gt;3des-cbc&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I add additional algorithm : ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr 3des-cbc&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASR920#&lt;STRONG&gt;show ip ssh&lt;/STRONG&gt;&lt;BR /&gt;SSH Enabled - version 2.0&lt;BR /&gt;Authentication methods:publickey,keyboard-interactive,password&lt;BR /&gt;Authentication Publickey Algorithms:x509v3-ssh-rsa,ssh-rsa&lt;BR /&gt;Hostkey Algorithms:x509v3-ssh-rsa,ssh-rsa&lt;BR /&gt;Encryption Algorithms:&lt;STRONG&gt;aes128-ctr,aes192-ctr,aes256-ctr,3des-cbc&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;And all work fine&lt;/P&gt;</description>
      <pubDate>Wed, 12 Dec 2018 22:18:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/3762418#M305944</guid>
      <dc:creator>asapa</dc:creator>
      <dc:date>2018-12-12T22:18:46Z</dc:date>
    </item>
    <item>
      <title>Re: Issue SSH</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/3885144#M317737</link>
      <description>&lt;P&gt;Thanks for this information&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2019 09:34:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/3885144#M317737</guid>
      <dc:creator>LEL</dc:creator>
      <dc:date>2019-07-05T09:34:33Z</dc:date>
    </item>
    <item>
      <title>Re: Issue SSH</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/3885204#M317745</link>
      <description>&lt;P&gt;Your issue more than likely is ssh strict host key checking is enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check your ssh configuration for this command:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip ssh stricthostkeycheck&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If it's in your configuration, you have two options:&lt;/P&gt;&lt;P&gt;1. enable the&amp;nbsp;ip ssh pubkey-chain command:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip ssh pubkey-chain&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2. &lt;/STRONG&gt;Disable&amp;nbsp;strict host key checking&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no ip ssh stricthostkeycheck&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In your case, I would try option 2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good Luck!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2019 11:59:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/3885204#M317745</guid>
      <dc:creator>jdjmoncivais</dc:creator>
      <dc:date>2019-07-05T11:59:12Z</dc:date>
    </item>
    <item>
      <title>Re: Issue SSH</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/3885207#M317747</link>
      <description>&lt;P&gt;Your issue more than likely is ssh strict host key checking is enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check your ssh configuration for this command:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip ssh stricthostkeycheck&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If it's in your configuration, you have two options:&lt;/P&gt;&lt;P&gt;1. enable the&amp;nbsp;ip ssh pubkey-chain command:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip ssh pubkey-chain&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2. &lt;/STRONG&gt;Disable&amp;nbsp;strict host key checking&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no ip ssh stricthostkeycheck&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In your case, I would try option 2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good Luck!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2019 12:00:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/3885207#M317747</guid>
      <dc:creator>jdjmoncivais</dc:creator>
      <dc:date>2019-07-05T12:00:35Z</dc:date>
    </item>
    <item>
      <title>Re: Issue SSH</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/3923419#M321442</link>
      <description>&lt;P&gt;i am to facing same issue&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Core-A-SW#ssh 10.200.2.134&lt;/P&gt;&lt;P&gt;[Connection to 10.200.2.134 aborted: error status 0]&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2019 17:09:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/3923419#M321442</guid>
      <dc:creator>sridharraja91@gmail.com</dc:creator>
      <dc:date>2019-09-12T17:09:52Z</dc:date>
    </item>
    <item>
      <title>Re: Issue SSH</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/4277866#M345743</link>
      <description>&lt;P&gt;Me too&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 20:05:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/issue-ssh/m-p/4277866#M345743</guid>
      <dc:creator>Ethan and Mia</dc:creator>
      <dc:date>2021-01-22T20:05:42Z</dc:date>
    </item>
  </channel>
</rss>

