<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 2960X weak diffie-hellman ciphers in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/2960x-weak-diffie-hellman-ciphers/m-p/4695187#M1093706</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1335611"&gt;@bigkeoni64&lt;/a&gt; if those are the only supported ciphers on the 2960X switches then you cannot change it. You could mitigate the issue on those switches by defining an ACL to restrict SSH access from trusted hosts/networks, denying all other connection attempts...therefore reducing the risk. Other than that, you'd have to replace the switches with newer Catalyst 9200/9300s switches that would support the strongest/most secure ciphers.&lt;/P&gt;</description>
    <pubDate>Wed, 28 Sep 2022 06:47:26 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2022-09-28T06:47:26Z</dc:date>
    <item>
      <title>2960X weak diffie-hellman ciphers</title>
      <link>https://community.cisco.com/t5/network-security/2960x-weak-diffie-hellman-ciphers/m-p/4695050#M1093701</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a few 2960x switches on the network with 15.2.7.E5 code and we have internal scanners that are calling out the diffie-hellman 'kex' as weak ciphers and should be disabled.&lt;/P&gt;
&lt;P&gt;It appears that these DH cipher's are the only ones available for this platform and cannot be removed. I'd assume if they were removed that SSH would not work either.&lt;/P&gt;
&lt;P&gt;TAC is saying that these are the only ones available for this platform. Has anyone else run up against trying to remove the DH from the #ip ssh server algo kex ?&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 27 Sep 2022 22:35:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2960x-weak-diffie-hellman-ciphers/m-p/4695050#M1093701</guid>
      <dc:creator>bigkeoni64</dc:creator>
      <dc:date>2022-09-27T22:35:30Z</dc:date>
    </item>
    <item>
      <title>Re: 2960X weak diffie-hellman ciphers</title>
      <link>https://community.cisco.com/t5/network-security/2960x-weak-diffie-hellman-ciphers/m-p/4695187#M1093706</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1335611"&gt;@bigkeoni64&lt;/a&gt; if those are the only supported ciphers on the 2960X switches then you cannot change it. You could mitigate the issue on those switches by defining an ACL to restrict SSH access from trusted hosts/networks, denying all other connection attempts...therefore reducing the risk. Other than that, you'd have to replace the switches with newer Catalyst 9200/9300s switches that would support the strongest/most secure ciphers.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2022 06:47:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2960x-weak-diffie-hellman-ciphers/m-p/4695187#M1093706</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-09-28T06:47:26Z</dc:date>
    </item>
  </channel>
</rss>

