<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Securing SSH, TLS, VPNs on Cisco IOS ISR in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/securing-ssh-tls-vpns-on-cisco-ios-isr/m-p/5294979#M1121199</link>
    <description>&lt;P&gt;I'm looking to provide guidance on router config, this I can do, been in networking for over a decade now. However, the one area where I'm less confident on though is in Security. Specifically, in the details of ciphers, hashes, and key exchange algorithm selections.&lt;/P&gt;&lt;P&gt;I'm knowledgeable enough, that I can kickout the worst / least secure, like RC4, (3)DES, MD5, SHA1, and very low DH Groups 1, 2, 5, etc --&amp;nbsp;Where I'm getting confused is in looking at Cisco command line SSH (TLS/SSL) options and among the higher end options. I'm seemingly finding conflicting information and not sure about what is or isn't vulnerable.&lt;BR /&gt;&lt;BR /&gt;That is, inside of securing SSH (server role) - encryption has three to four varieties of AES depending on key length. (e.g. aes256-cbc, aes256-ctr, aes256-gcm, aes256-gcm@openssh.com). I'm reading various discussion, either here on Cisco community, StackExchange, or from say security blogs seemingly either stating or suggesting that AES-CBC less desirable, crappy, or "weak". And while AES-GCM is mentioned as secure, one person was saying it can "catastrophically" fail if duplicate "IVs" happen to be used or generated or such. So maybe, AES-CTR is the choice?&lt;/P&gt;&lt;P&gt;But, when I look at "ip http secure-ciphersuite" for TLS security -- What I see is exclusively CBC and GCM offerings, except for an odd ball "tls13-chacha20-poly1305-sha256" encryption type. So I use google to try to learn about 'chacha20' and I find out that, "&lt;SPAN&gt;TLS 1.3 has only five possible cipher suites, because it removed all unsecure cipher suites from TLS 1.2" and chacha20 is one of those five. But, what are the other 4 cipher suites? Combinations of AES-GCM. No, AES-CTR. So does this mean that AES-CTR is vulnerable? And, what happened to GCM being able to catastrophically fail if duplicate "IVs" are used?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I'd provide links to the sources I'm referencing, but (from prior posting) I've found the auto-moderation really doesn't like web links.&lt;/P&gt;&lt;P&gt;Can someone help me sort out this information? Or, is my basic knowledge of just getting rid of those weakest ciphers, hashing, and key exchange groups good enough?&lt;/P&gt;</description>
    <pubDate>Thu, 29 May 2025 17:37:31 GMT</pubDate>
    <dc:creator>Aggron</dc:creator>
    <dc:date>2025-05-29T17:37:31Z</dc:date>
    <item>
      <title>Securing SSH, TLS, VPNs on Cisco IOS ISR</title>
      <link>https://community.cisco.com/t5/network-security/securing-ssh-tls-vpns-on-cisco-ios-isr/m-p/5294979#M1121199</link>
      <description>&lt;P&gt;I'm looking to provide guidance on router config, this I can do, been in networking for over a decade now. However, the one area where I'm less confident on though is in Security. Specifically, in the details of ciphers, hashes, and key exchange algorithm selections.&lt;/P&gt;&lt;P&gt;I'm knowledgeable enough, that I can kickout the worst / least secure, like RC4, (3)DES, MD5, SHA1, and very low DH Groups 1, 2, 5, etc --&amp;nbsp;Where I'm getting confused is in looking at Cisco command line SSH (TLS/SSL) options and among the higher end options. I'm seemingly finding conflicting information and not sure about what is or isn't vulnerable.&lt;BR /&gt;&lt;BR /&gt;That is, inside of securing SSH (server role) - encryption has three to four varieties of AES depending on key length. (e.g. aes256-cbc, aes256-ctr, aes256-gcm, aes256-gcm@openssh.com). I'm reading various discussion, either here on Cisco community, StackExchange, or from say security blogs seemingly either stating or suggesting that AES-CBC less desirable, crappy, or "weak". And while AES-GCM is mentioned as secure, one person was saying it can "catastrophically" fail if duplicate "IVs" happen to be used or generated or such. So maybe, AES-CTR is the choice?&lt;/P&gt;&lt;P&gt;But, when I look at "ip http secure-ciphersuite" for TLS security -- What I see is exclusively CBC and GCM offerings, except for an odd ball "tls13-chacha20-poly1305-sha256" encryption type. So I use google to try to learn about 'chacha20' and I find out that, "&lt;SPAN&gt;TLS 1.3 has only five possible cipher suites, because it removed all unsecure cipher suites from TLS 1.2" and chacha20 is one of those five. But, what are the other 4 cipher suites? Combinations of AES-GCM. No, AES-CTR. So does this mean that AES-CTR is vulnerable? And, what happened to GCM being able to catastrophically fail if duplicate "IVs" are used?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I'd provide links to the sources I'm referencing, but (from prior posting) I've found the auto-moderation really doesn't like web links.&lt;/P&gt;&lt;P&gt;Can someone help me sort out this information? Or, is my basic knowledge of just getting rid of those weakest ciphers, hashing, and key exchange groups good enough?&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2025 17:37:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-ssh-tls-vpns-on-cisco-ios-isr/m-p/5294979#M1121199</guid>
      <dc:creator>Aggron</dc:creator>
      <dc:date>2025-05-29T17:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: Securing SSH, TLS, VPNs on Cisco IOS ISR</title>
      <link>https://community.cisco.com/t5/network-security/securing-ssh-tls-vpns-on-cisco-ios-isr/m-p/5295427#M1121209</link>
      <description>&lt;P&gt;There is cisco secuirty advisor' you can check ssh cipher recommendations.&lt;/P&gt;
&lt;P&gt;For ISR ios xe harden check below&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sec.cloudapps.cisco.com/security/center/resources/IOS_XE_hardening" target="_blank"&gt;https://sec.cloudapps.cisco.com/security/center/resources/IOS_XE_hardening&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 31 May 2025 07:37:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-ssh-tls-vpns-on-cisco-ios-isr/m-p/5295427#M1121209</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-05-31T07:37:30Z</dc:date>
    </item>
    <item>
      <title>Re: Securing SSH, TLS, VPNs on Cisco IOS ISR</title>
      <link>https://community.cisco.com/t5/network-security/securing-ssh-tls-vpns-on-cisco-ios-isr/m-p/5296175#M1121225</link>
      <description>&lt;P&gt;The basics you mentioned are sufficient for 95% of use cases.&lt;/P&gt;
&lt;P&gt;I would add that it is almost never necessary to run the "ip http server", so the TLS parameters are a moot point when that is disabled.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 12:43:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-ssh-tls-vpns-on-cisco-ios-isr/m-p/5296175#M1121225</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-06-03T12:43:47Z</dc:date>
    </item>
  </channel>
</rss>

