<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disabling weak protocols in ACS 4.2? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/disabling-weak-protocols-in-acs-4-2/m-p/1543092#M253910</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Steve,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently SSHv1 cannot be disabled:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_tech_note09186a00808d9199.shtml#SSHv1v2"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_tech_note09186a00808d9199.shtml#SSHv1v2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is still the case on ACS 4.2.1 which is the latest currently for the ACS 4.x line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That being said, the SSH shell is very limited on the ACS. The only thing that you can do is initiate an RDBMS synchronization. There are three other commands (csutil commands) but they cannot even be run unless the services are stopped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 30 Nov 2010 21:55:28 GMT</pubDate>
    <dc:creator>Nate Austin</dc:creator>
    <dc:date>2010-11-30T21:55:28Z</dc:date>
    <item>
      <title>Disabling weak protocols in ACS 4.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/disabling-weak-protocols-in-acs-4-2/m-p/1543091#M253884</link>
      <description>&lt;P&gt;This may be old hat by now but can someone confirm or deny that the SSH server on ACS4.2 can be configured to avoid client negotiation with weak protocols? I'd like to ensure that SSHv1 cannot be used. If it (SSHv1) can be disabled, exactly how is this achived? If it's not possible with ACS4.2 is there a later version where this can be disabled?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:37:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/disabling-weak-protocols-in-acs-4-2/m-p/1543091#M253884</guid>
      <dc:creator>sforrester</dc:creator>
      <dc:date>2019-03-11T00:37:27Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling weak protocols in ACS 4.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/disabling-weak-protocols-in-acs-4-2/m-p/1543092#M253910</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Steve,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently SSHv1 cannot be disabled:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_tech_note09186a00808d9199.shtml#SSHv1v2"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_tech_note09186a00808d9199.shtml#SSHv1v2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is still the case on ACS 4.2.1 which is the latest currently for the ACS 4.x line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That being said, the SSH shell is very limited on the ACS. The only thing that you can do is initiate an RDBMS synchronization. There are three other commands (csutil commands) but they cannot even be run unless the services are stopped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Nov 2010 21:55:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/disabling-weak-protocols-in-acs-4-2/m-p/1543092#M253910</guid>
      <dc:creator>Nate Austin</dc:creator>
      <dc:date>2010-11-30T21:55:28Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling weak protocols in ACS 4.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/disabling-weak-protocols-in-acs-4-2/m-p/1543093#M253930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many thanks for that definitive answer, very helpful. I can now think about whether I need to go to V5.0+.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Dec 2010 10:27:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/disabling-weak-protocols-in-acs-4-2/m-p/1543093#M253930</guid>
      <dc:creator>sforrester</dc:creator>
      <dc:date>2010-12-01T10:27:21Z</dc:date>
    </item>
  </channel>
</rss>

