<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disabling SSH weak key exchange algorithms in IOS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/disabling-ssh-weak-key-exchange-algorithms-in-ios/m-p/4715154#M1094733</link>
    <description>&lt;P&gt;I fixed my issue!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue:&amp;nbsp;&lt;/STRONG&gt;SSH Server Supports Weak Key Exchange Algorithms:22&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Fix cli -&amp;nbsp;&lt;/STRONG&gt;ip ssh serv alg kex diffie-hellman-group14-sha1&lt;/P&gt;&lt;P&gt;Make sure you can open another ssh session into your device after you put the command in, so you don't lock yourself out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;R&lt;/STRONG&gt;&lt;STRONG&gt;eccomend to do this also:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ip ssh time-out 15&lt;/P&gt;&lt;P&gt;ip ssh authentication-retries 2&lt;/P&gt;&lt;P&gt;ip ssh version 2&lt;/P&gt;&lt;P&gt;ip ssh server algorithm mac hmac-sha2-256&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;this will have error and can’t use putty if I use a higher one&lt;/P&gt;&lt;P&gt;ip ssh server algorithm encryption aes256-ctr&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 02 Nov 2022 21:04:43 GMT</pubDate>
    <dc:creator>Network713</dc:creator>
    <dc:date>2022-11-02T21:04:43Z</dc:date>
    <item>
      <title>Disabling SSH weak key exchange algorithms in IOS</title>
      <link>https://community.cisco.com/t5/network-security/disabling-ssh-weak-key-exchange-algorithms-in-ios/m-p/4558091#M1087617</link>
      <description>&lt;P&gt;A Nessus scan reported several of our devices are allowing weak key exchange algorithms and I have been asked to disable them. I have specifically been asked to disable:&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;diffie-hellman-group-exchange-sha1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;diffie-hellman-group1-sha1&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN&gt;on all devices. I've read various posts and I'm still not sure how to do this. I have found devices where the 'show ip ssh' is essentially the same, but one reports the vulnerability and one doesn't. I have been trying to apply:&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;crypto key generate rsa label SSH-KEY modulus 2048&lt;BR /&gt;ip ssh rsa keypair-name SSH-KEY&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;ip ssh dh min size 2048&lt;BR /&gt;ip ssh server algorithm encryption aes256-ctr&lt;BR /&gt;ip ssh server algorithm mac hmac-sha1&lt;BR /&gt;line vt 0 15&lt;BR /&gt;transport input ssh&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;everywhere, but this doesn't s&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Feb 2022 17:01:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-ssh-weak-key-exchange-algorithms-in-ios/m-p/4558091#M1087617</guid>
      <dc:creator>spfister336</dc:creator>
      <dc:date>2022-02-23T17:01:48Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling SSH weak key exchange algorithms in IOS</title>
      <link>https://community.cisco.com/t5/network-security/disabling-ssh-weak-key-exchange-algorithms-in-ios/m-p/4558101#M1087618</link>
      <description>&lt;P&gt;Not sure what is this device here ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Follow below guide to disable :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://mwhubbard.blogspot.com/2020/06/disable-weak-sshssl-ciphers-in-cisco-ios.html" target="_blank"&gt;https://mwhubbard.blogspot.com/2020/06/disable-weak-sshssl-ciphers-in-cisco-ios.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Feb 2022 17:08:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-ssh-weak-key-exchange-algorithms-in-ios/m-p/4558101#M1087618</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-02-23T17:08:46Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling SSH weak key exchange algorithms in IOS</title>
      <link>https://community.cisco.com/t5/network-security/disabling-ssh-weak-key-exchange-algorithms-in-ios/m-p/4558118#M1087619</link>
      <description>&lt;P&gt;The devices are mostly stacks of 2960Xs and 4500X VSS pairs. I think I've already applied everything in that link, but I'll go over it again carefully.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Feb 2022 17:20:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-ssh-weak-key-exchange-algorithms-in-ios/m-p/4558118#M1087619</guid>
      <dc:creator>spfister336</dc:creator>
      <dc:date>2022-02-23T17:20:41Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling SSH weak key exchange algorithms in IOS</title>
      <link>https://community.cisco.com/t5/network-security/disabling-ssh-weak-key-exchange-algorithms-in-ios/m-p/4558129#M1087620</link>
      <description>&lt;P&gt;also post the output here for us to understand what keys are there. reset RSA keys by making zero and creating new RSA key with higher bit to be consider.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;make sure you do using right access method to change RSA in case you like to go with that option&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Feb 2022 17:27:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-ssh-weak-key-exchange-algorithms-in-ios/m-p/4558129#M1087620</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-02-23T17:27:03Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling SSH weak key exchange algorithms in IOS</title>
      <link>https://community.cisco.com/t5/network-security/disabling-ssh-weak-key-exchange-algorithms-in-ios/m-p/4558300#M1087622</link>
      <description>&lt;P&gt;I can post whatever is needed. Do you need the output from 'show ip ssh'?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Feb 2022 19:15:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-ssh-weak-key-exchange-algorithms-in-ios/m-p/4558300#M1087622</guid>
      <dc:creator>spfister336</dc:creator>
      <dc:date>2022-02-23T19:15:02Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling SSH weak key exchange algorithms in IOS</title>
      <link>https://community.cisco.com/t5/network-security/disabling-ssh-weak-key-exchange-algorithms-in-ios/m-p/4558444#M1087624</link>
      <description>&lt;P&gt;yes also suggest to post show run and show ip ssh&lt;/P&gt;</description>
      <pubDate>Thu, 24 Feb 2022 00:22:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-ssh-weak-key-exchange-algorithms-in-ios/m-p/4558444#M1087624</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-02-24T00:22:21Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling SSH weak key exchange algorithms in IOS</title>
      <link>https://community.cisco.com/t5/network-security/disabling-ssh-weak-key-exchange-algorithms-in-ios/m-p/4715154#M1094733</link>
      <description>&lt;P&gt;I fixed my issue!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue:&amp;nbsp;&lt;/STRONG&gt;SSH Server Supports Weak Key Exchange Algorithms:22&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Fix cli -&amp;nbsp;&lt;/STRONG&gt;ip ssh serv alg kex diffie-hellman-group14-sha1&lt;/P&gt;&lt;P&gt;Make sure you can open another ssh session into your device after you put the command in, so you don't lock yourself out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;R&lt;/STRONG&gt;&lt;STRONG&gt;eccomend to do this also:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ip ssh time-out 15&lt;/P&gt;&lt;P&gt;ip ssh authentication-retries 2&lt;/P&gt;&lt;P&gt;ip ssh version 2&lt;/P&gt;&lt;P&gt;ip ssh server algorithm mac hmac-sha2-256&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;this will have error and can’t use putty if I use a higher one&lt;/P&gt;&lt;P&gt;ip ssh server algorithm encryption aes256-ctr&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2022 21:04:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-ssh-weak-key-exchange-algorithms-in-ios/m-p/4715154#M1094733</guid>
      <dc:creator>Network713</dc:creator>
      <dc:date>2022-11-02T21:04:43Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling SSH weak key exchange algorithms in IOS</title>
      <link>https://community.cisco.com/t5/network-security/disabling-ssh-weak-key-exchange-algorithms-in-ios/m-p/4719406#M1094987</link>
      <description>&lt;P&gt;added 3 of the statements above and it did resolve my ssh failures on scan........thanks for providing a solution&lt;/P&gt;</description>
      <pubDate>Thu, 10 Nov 2022 16:32:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-ssh-weak-key-exchange-algorithms-in-ios/m-p/4719406#M1094987</guid>
      <dc:creator>ronaldrapp7190</dc:creator>
      <dc:date>2022-11-10T16:32:59Z</dc:date>
    </item>
  </channel>
</rss>

