<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How can you setup SSH 2FA for switches and routers? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-can-you-setup-ssh-2fa-for-switches-and-routers/m-p/4569478#M1088209</link>
    <description>&lt;P&gt;Take a look at the following to see if this could be an option to meet your end goals:&amp;nbsp;&lt;A href="https://www.pragmasys.com/products/support/cisco-2-factor" target="_blank"&gt;https://www.pragmasys.com/products/support/cisco-2-factor&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;NOTE: for the devices or tools that do not require 2FA you can enable both (x509 + password) via:&amp;nbsp;ip ssh server algorithm authentication publickey password&lt;/P&gt;
&lt;P&gt;HTH!&lt;/P&gt;</description>
    <pubDate>Sun, 13 Mar 2022 14:20:25 GMT</pubDate>
    <dc:creator>Mike.Cifelli</dc:creator>
    <dc:date>2022-03-13T14:20:25Z</dc:date>
    <item>
      <title>How can you setup SSH 2FA for switches and routers?</title>
      <link>https://community.cisco.com/t5/network-security/how-can-you-setup-ssh-2fa-for-switches-and-routers/m-p/4569376#M1088201</link>
      <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;Helping on a project that has a simple requirement — to lock down our switches and routers to have &lt;/SPAN&gt;&lt;SPAN&gt;2FA for administrator access. &amp;nbsp;But, we’re out of our element on implementing this – and could use &lt;/SPAN&gt;&lt;SPAN&gt;advice.&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;We do not have any sort of directory right now … at all … but will shortly have everyone in the Office 365 Admin with assorted different 365 licenses. So, to an extent, Azure/AD is available if we wanted. But, there’s no on-premise directory, and we’d prefer not to have another item to manage.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;We were thinking to use something simple like JumpCloud’s RADIUS in the Cloud service, but we’re open to other ideas. &amp;nbsp;Was hoping to avoid a full Duo, etc… implementation as it’s only for about 50 switches/routers, and only for admins, not users in anyway.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;We’ve been able to create an instance of a RADIUS server in the cloud on JumpCloud, and we see the name, secret key, and believe that we have the right Ips, but when messing around in the Cisco console, to see if we can make anything stick, we’re just not getting anywhere. &amp;nbsp;We don’t see the device show up in the JumpCloud dashboard, and not sure if we’re doing the aaa setup right either (or what is necessary from it).&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;It just seems this shouldn’t be so hard. &amp;nbsp;We seem to be missing the fundamental piece of understanding of what’s necessary to setup simple 2FA for these devices, even using a service like JumpCloud’s RADIUS. &amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Any ideas? &amp;nbsp;Suggestions as to alternatives? &amp;nbsp;Just looking for something inexpensive and not a pain in the ass for basic 2FA.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Things to note:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV&gt;&lt;SPAN&gt;- Automated/scripted access doesn’t need 2FA. &amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV&gt;&lt;SPAN&gt;- Network monitoring doesn’t have to be 2FA.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV&gt;&lt;SPAN&gt;- We can have an admin user without 2FA if we lock it to physical access (e.g., console port)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV&gt;&lt;SPAN&gt;- Can assume everything is Cisco. &amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV&gt;&lt;SPAN&gt;- Most of the routers are actually ASAs. &amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV&gt;&lt;SPAN&gt;- Most models of switches are Cisco Catalyst (3650 and 4500). &lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Sun, 13 Mar 2022 01:32:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-you-setup-ssh-2fa-for-switches-and-routers/m-p/4569376#M1088201</guid>
      <dc:creator>SWtw</dc:creator>
      <dc:date>2022-03-13T01:32:17Z</dc:date>
    </item>
    <item>
      <title>Re: How can you setup SSH 2FA for switches and routers?</title>
      <link>https://community.cisco.com/t5/network-security/how-can-you-setup-ssh-2fa-for-switches-and-routers/m-p/4569402#M1088207</link>
      <description>&lt;P&gt;I really do not understand why anyone would want to make this process so complicated.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Get a RADIUS server and create several tiered "network" accounts and put them into a "special" group.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Only those who have the "needs" to log into are given access to log into network equipment (i.e, Finance and Shipping people do not need to have "admin" access nor a requirement to log into network equipment).&lt;/P&gt;
&lt;P&gt;Passwords needs to be complicated and regularly changed.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If someone really wants to do 2FA/MFA, the RADIUS server is where 2FA/MFA needs to be enabled.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 13 Mar 2022 03:22:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-you-setup-ssh-2fa-for-switches-and-routers/m-p/4569402#M1088207</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2022-03-13T03:22:37Z</dc:date>
    </item>
    <item>
      <title>Re: How can you setup SSH 2FA for switches and routers?</title>
      <link>https://community.cisco.com/t5/network-security/how-can-you-setup-ssh-2fa-for-switches-and-routers/m-p/4569478#M1088209</link>
      <description>&lt;P&gt;Take a look at the following to see if this could be an option to meet your end goals:&amp;nbsp;&lt;A href="https://www.pragmasys.com/products/support/cisco-2-factor" target="_blank"&gt;https://www.pragmasys.com/products/support/cisco-2-factor&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;NOTE: for the devices or tools that do not require 2FA you can enable both (x509 + password) via:&amp;nbsp;ip ssh server algorithm authentication publickey password&lt;/P&gt;
&lt;P&gt;HTH!&lt;/P&gt;</description>
      <pubDate>Sun, 13 Mar 2022 14:20:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-you-setup-ssh-2fa-for-switches-and-routers/m-p/4569478#M1088209</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2022-03-13T14:20:25Z</dc:date>
    </item>
  </channel>
</rss>

