<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco FTD Supported SSH Version in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ftd-supported-ssh-version/m-p/4800202#M1098949</link>
    <description>&lt;P&gt;Old post but was going through this as well. I like what&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp; showed, but trying to SSH via v1 also generates an error which could be used as demo as well.&lt;/P&gt;</description>
    <pubDate>Thu, 23 Mar 2023 16:57:52 GMT</pubDate>
    <dc:creator>CiscoBrownBelt</dc:creator>
    <dc:date>2023-03-23T16:57:52Z</dc:date>
    <item>
      <title>Cisco FTD Supported SSH Version</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-supported-ssh-version/m-p/4429909#M1082081</link>
      <description>&lt;P&gt;Hi Guys.&lt;/P&gt;&lt;P&gt;I hope you are doing fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our infrastructure is being audited by an auditor and they asked us to provide a proof which shows FTDs (We are using Cisco Firepower 2100 series) use SSH version 2.&lt;/P&gt;&lt;P&gt;I looked everywhere in order to find out about the SSH version which is using by FTD, but I did not find anything.&lt;/P&gt;&lt;P&gt;Could you please help in this matter? Any official documents or a command which show this feature would work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Peyman&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jul 2021 13:48:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-supported-ssh-version/m-p/4429909#M1082081</guid>
      <dc:creator>PeymanSarayeli22142</dc:creator>
      <dc:date>2021-07-08T13:48:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD Supported SSH Version</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-supported-ssh-version/m-p/4430014#M1082088</link>
      <description>&lt;P&gt;It doesn't show up in the config but you can verify it via demonstration by capturing the session info of a connection. For instance, here's one from Putty connecting to FTD 6.6.4:&lt;/P&gt;
&lt;PRE&gt;2021-07-08 11:59:09	We claim version: SSH-2.0-PuTTY_Release_0.70
&lt;STRONG&gt;&lt;FONT color="#339966"&gt;2021-07-08 11:59:09	Server version: SSH-2.0-OpenSSH_7.5
2021-07-08 11:59:09	Using SSH protocol version 2&lt;/FONT&gt;&lt;/STRONG&gt;
2021-07-08 11:59:09	Doing ECDH key exchange with curve Curve25519 and hash SHA-256
2021-07-08 11:59:10	Server also has ecdsa-sha2-nistp256/ssh-rsa host keys, but we don't know any of them
2021-07-08 11:59:10	Host key fingerprint is:
2021-07-08 11:59:10	ssh-ed25519 256 &amp;lt;redacted&amp;gt;
2021-07-08 11:59:10	Initialised AES-256 SDCTR client-&amp;gt;server encryption
2021-07-08 11:59:10	Initialised HMAC-SHA-256 client-&amp;gt;server MAC algorithm
2021-07-08 11:59:10	Initialised AES-256 SDCTR server-&amp;gt;client encryption
2021-07-08 11:59:10	Initialised HMAC-SHA-256 server-&amp;gt;client MAC algorithm
2021-07-08 11:59:12	Attempting keyboard-interactive authentication
2021-07-08 11:59:18	Access granted&lt;/PRE&gt;
&lt;P&gt;You can also scan it using nmap to confirm:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;nmap -sV -sC &amp;lt;target&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;&lt;A href="https://nmap.org/nsedoc/scripts/sshv1.html" target="_blank"&gt;https://nmap.org/nsedoc/scripts/sshv1.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jul 2021 16:17:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-supported-ssh-version/m-p/4430014#M1082088</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-07-08T16:17:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD Supported SSH Version</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-supported-ssh-version/m-p/4430015#M1082089</link>
      <description>&lt;P&gt;To view SSH run-config from FTD CLI: &amp;gt;show running-config ssh&lt;/P&gt;
&lt;P&gt;You can manage/configure ssh settings via platform settings within FMC under a Threat Defense Settings policy (FMC-&amp;gt;Devices-&amp;gt;Platform Settings: Threat Defense Settings-&amp;gt;Secure Shell).&amp;nbsp; I know in older versions of FMC this is where you could specify/show which versions are configured.&amp;nbsp; I have FMC 6.7 now and that capability is not present, which leads me to believe that it automagically uses v2.&amp;nbsp; However, I am not sure how to view/extract that nor do I know of any official documentation stating that.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jul 2021 16:06:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-supported-ssh-version/m-p/4430015#M1082089</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2021-07-08T16:06:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD Supported SSH Version</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-supported-ssh-version/m-p/4430346#M1082100</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;Thanks a lot for your answer.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jul 2021 07:41:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-supported-ssh-version/m-p/4430346#M1082100</guid>
      <dc:creator>PeymanSarayeli22142</dc:creator>
      <dc:date>2021-07-09T07:41:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD Supported SSH Version</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-supported-ssh-version/m-p/4430351#M1082101</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/833210"&gt;@Mike.Cifelli&lt;/a&gt;&amp;nbsp;Thanks for your answer.&lt;/P&gt;&lt;P&gt;I have also searched a lot in this regard but I could not find anything useful.&lt;/P&gt;&lt;P&gt;But I think Marvin's solution helps in this case.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jul 2021 07:46:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-supported-ssh-version/m-p/4430351#M1082101</guid>
      <dc:creator>PeymanSarayeli22142</dc:creator>
      <dc:date>2021-07-09T07:46:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD Supported SSH Version</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-supported-ssh-version/m-p/4800202#M1098949</link>
      <description>&lt;P&gt;Old post but was going through this as well. I like what&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp; showed, but trying to SSH via v1 also generates an error which could be used as demo as well.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 16:57:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-supported-ssh-version/m-p/4800202#M1098949</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2023-03-23T16:57:52Z</dc:date>
    </item>
  </channel>
</rss>

