<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE SSH ciphers in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-ssh-ciphers/m-p/3863893#M472671</link>
    <description>&lt;P&gt;Hi Hsing,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Which ISE version are you using ?&lt;/P&gt;
&lt;P&gt;I am using 2.4 and not seeing the same output ?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ssh.png" style="width: 734px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/37581i9254450C4A0D1039/image-size/large?v=v2&amp;amp;px=999" role="button" title="ssh.png" alt="ssh.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 28 May 2019 14:53:15 GMT</pubDate>
    <dc:creator>umahar</dc:creator>
    <dc:date>2019-05-28T14:53:15Z</dc:date>
    <item>
      <title>Cisco ISE SSH ciphers</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-ssh-ciphers/m-p/3862636#M472666</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;An infosec team is in the process of certifying ISE and is seeking clarification on the various parameters used in SSH.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Should use only below approved key exchanges.&lt;/P&gt;
&lt;P&gt;KexAlgorithms ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Use Only below approved MACs&lt;/P&gt;
&lt;P&gt;MACs &lt;A href="mailto:hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com" target="_blank" rel="noopener"&gt;hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Use only below Host Keys&lt;/P&gt;
&lt;P&gt;HostKey &lt;A href="mailto:ecdsa-sha2-nistp521-cert-v01@openssh.com" target="_blank" rel="noopener"&gt;ecdsa-sha2-nistp521-cert-v01@openssh.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;HostKey&amp;nbsp; &lt;A href="mailto:ecdsa-sha2-nistp384-cert-v01@openssh.com" target="_blank" rel="noopener"&gt;ecdsa-sha2-nistp384-cert-v01@openssh.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;HostKey &lt;A href="mailto:ecdsa-sha2-nistp256-cert-v01@openssh.com" target="_blank" rel="noopener"&gt;ecdsa-sha2-nistp256-cert-v01@openssh.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;HostKey ecdsa-sha2-nistp521&lt;/P&gt;
&lt;P&gt;HostKey ecdsa-sha2-nistp384&lt;/P&gt;
&lt;P&gt;HostKey ecdsa-sha2-nistp256&lt;/P&gt;
&lt;P&gt;HostKey &lt;A href="mailto:ssh-ed25519-cert-v01@openssh.com" target="_blank" rel="noopener"&gt;ssh-ed25519-cert-v01@openssh.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there any documentation which talks about it ?&lt;/P&gt;
&lt;P&gt;Appreciate if anyone can point me in that direction.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If not then should we just look at the Red Hat documentation to verify these parameters as it is the underlying OS.&lt;/P&gt;
&lt;P&gt;However in the past we have had to seek TAC's help to enable strong ciphers via root patch.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2019 20:26:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-ssh-ciphers/m-p/3862636#M472666</guid>
      <dc:creator>umahar</dc:creator>
      <dc:date>2019-05-24T20:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE SSH ciphers</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-ssh-ciphers/m-p/3862775#M472669</link>
      <description>We have this but I think we need to dig deeper&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-security-best-practices-hardening/ta-p/3640651" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-security-best-practices-hardening/ta-p/3640651&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Sat, 25 May 2019 11:49:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-ssh-ciphers/m-p/3862775#M472669</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-05-25T11:49:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE SSH ciphers</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-ssh-ciphers/m-p/3862852#M472670</link>
      <description>&lt;P&gt;Recent ISE Releases have some options for SSH. See the configuration mode command &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-6/cli_guide/b_ise_CLIReferenceGuide_26/b_ise_CLIReferenceGuide_26_chapter_011.html#wp1664237597" target="_blank"&gt;service&lt;/A&gt;&lt;/P&gt;
&lt;PRE&gt;ise-1/admin(config)# service sshd ?
  enable                  Enable sshd service
  encryption-algorithm    Configure SSH encryption algorithms. supported algorithms are a
  encryption-mode         Configure SSH encryption mode on system. Supported modes are cb
  key-exchange-algorithm  Specify allowable key exchange algorithms for sshd service
  loglevel                Log level of messages from sshd to secure system log
&lt;/PRE&gt;
&lt;P&gt;If you need additional options, please remember to ask TAC to file new bugs if no existing ones fit the bills.&lt;/P&gt;</description>
      <pubDate>Sat, 25 May 2019 19:29:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-ssh-ciphers/m-p/3862852#M472670</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-05-25T19:29:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE SSH ciphers</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-ssh-ciphers/m-p/3863893#M472671</link>
      <description>&lt;P&gt;Hi Hsing,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Which ISE version are you using ?&lt;/P&gt;
&lt;P&gt;I am using 2.4 and not seeing the same output ?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ssh.png" style="width: 734px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/37581i9254450C4A0D1039/image-size/large?v=v2&amp;amp;px=999" role="button" title="ssh.png" alt="ssh.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2019 14:53:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-ssh-ciphers/m-p/3863893#M472671</guid>
      <dc:creator>umahar</dc:creator>
      <dc:date>2019-05-28T14:53:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE SSH ciphers</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-ssh-ciphers/m-p/3864692#M472677</link>
      <description>I am running patch 8 on 2.4 and see the same as hsing</description>
      <pubDate>Wed, 29 May 2019 19:21:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-ssh-ciphers/m-p/3864692#M472677</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-05-29T19:21:45Z</dc:date>
    </item>
  </channel>
</rss>

