<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSH Weak MAC algorithms in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ssh-weak-mac-algorithms/m-p/2516997#M73758</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Hi All,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;we are running security assessment on Cisco ISE 1.2.1 using nessus software, and we found out that is a SSH weak MAC algorithms detect, how can we disable md5, md5-96, sha1-96. we have also enable "service sshd key-exchange-algorithm diffie-hellman-group14-sha1" in CLI and restart appliance but still face same issue, need this resolve.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;kindly advice.&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;service sshd enable&lt;BR /&gt;service sshd key-exchange-algorithm diffie-hellman-group14-sha1&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/7-31-2014_12-06-24_pm.jpg" class="migrated-markup-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/7-30-2014_12-01-54_pm_1.jpg" class="migrated-markup-image" /&gt;&lt;BR /&gt;&lt;!--MEDIA-WRAPPER-END-1--&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 04:54:11 GMT</pubDate>
    <dc:creator>Freemen</dc:creator>
    <dc:date>2019-03-11T04:54:11Z</dc:date>
    <item>
      <title>SSH Weak MAC algorithms</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-weak-mac-algorithms/m-p/2516997#M73758</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Hi All,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;we are running security assessment on Cisco ISE 1.2.1 using nessus software, and we found out that is a SSH weak MAC algorithms detect, how can we disable md5, md5-96, sha1-96. we have also enable "service sshd key-exchange-algorithm diffie-hellman-group14-sha1" in CLI and restart appliance but still face same issue, need this resolve.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;kindly advice.&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;service sshd enable&lt;BR /&gt;service sshd key-exchange-algorithm diffie-hellman-group14-sha1&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/7-31-2014_12-06-24_pm.jpg" class="migrated-markup-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/7-30-2014_12-01-54_pm_1.jpg" class="migrated-markup-image" /&gt;&lt;BR /&gt;&lt;!--MEDIA-WRAPPER-END-1--&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:54:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-weak-mac-algorithms/m-p/2516997#M73758</guid>
      <dc:creator>Freemen</dc:creator>
      <dc:date>2019-03-11T04:54:11Z</dc:date>
    </item>
    <item>
      <title>im having this same issue..is</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-weak-mac-algorithms/m-p/2516998#M73759</link>
      <description>&lt;P&gt;im having this same issue..is there a solution for this.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jul 2014 04:45:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-weak-mac-algorithms/m-p/2516998#M73759</guid>
      <dc:creator>nervinder</dc:creator>
      <dc:date>2014-07-30T04:45:22Z</dc:date>
    </item>
  </channel>
</rss>

