<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable SSH Algorithms on CISCO Switches in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/disable-ssh-algorithms-on-cisco-switches/m-p/5327607#M1122592</link>
    <description>&lt;P&gt;Hi Jens, Thanks for replying.&lt;BR /&gt;&lt;BR /&gt;My main issue and the reason I reached out is because the switch is not recognizing these commands. As shown Below. I am unaware of what exactly would be causing this.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ClayKoldenRTC_0-1757098560676.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/251466i7E4FADCCD7345200/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ClayKoldenRTC_0-1757098560676.png" alt="ClayKoldenRTC_0-1757098560676.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 05 Sep 2025 18:56:28 GMT</pubDate>
    <dc:creator>Clay Kolden - RTC</dc:creator>
    <dc:date>2025-09-05T18:56:28Z</dc:date>
    <item>
      <title>Disable SSH Algorithms on CISCO Switches</title>
      <link>https://community.cisco.com/t5/network-security/disable-ssh-algorithms-on-cisco-switches/m-p/5327590#M1122589</link>
      <description>&lt;P&gt;&lt;BR /&gt;Our CISCO 9300 Catalyst switch has a weak SSH algorithms like KEX and MAC ciphers. Specifically the ones listed below and replace them with non-deprecated algorithms. The instructions I have found have been misleading and commands are inaccurate. Any advice would be greatly appreciated.&lt;BR /&gt;KEX:&lt;BR /&gt;diffie-hellman-group-exchange-sha1 (2048-bit)&lt;/P&gt;&lt;P&gt;diffie-hellman-group14-sha1&lt;BR /&gt;&lt;BR /&gt;MAC:&lt;BR /&gt;hmac-sha1&lt;/P&gt;&lt;P&gt;hmac-sha1-96&lt;/P&gt;</description>
      <pubDate>Fri, 05 Sep 2025 17:35:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-ssh-algorithms-on-cisco-switches/m-p/5327590#M1122589</guid>
      <dc:creator>Clay Kolden - RTC</dc:creator>
      <dc:date>2025-09-05T17:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: Disable SSH Algorithms on CISCO Switches</title>
      <link>https://community.cisco.com/t5/network-security/disable-ssh-algorithms-on-cisco-switches/m-p/5327593#M1122590</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1916377"&gt;@Clay Kolden - RTC&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;you can use the following commands to add or delete algorithms:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;Sw01(config)#ip ssh server algorithm ?
  authentication  User authentication methods advertised to client
  encryption      Encrytption algorithms advertised to other party
  hostkey         Hostkey publickey algorithms advertised to client
  kex             KEX algorithms advertised to other party
  mac             MAC algorithms advertised to other party
  publickey       Acceptable publickey algorithms for User authentication&lt;/LI-CODE&gt;
&lt;P&gt;For the KEX and MAC algorithms you have many options:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;Sw01(config)#ip ssh server algorithm kex ?
  curve25519-sha256              Curve 25519 key exchange algorithm
  curve25519-sha256@libssh.org   Curve 25519 key exchange algorithm old name
  diffie-hellman-group14-sha1    DH_GRP14_SHA1 diffie-hellman key exchange
                                 algorithm
  diffie-hellman-group14-sha256  DH_GRP14_SHA256 diffie-hellman key exchange
                                 algorithm
  diffie-hellman-group16-sha512  DH_GRP16_SHA512 diffie-hellman key exchange
                                 algorithm
  ecdh-sha2-nistp256             ECDH_SHA2_P256 ecdh key exchange algorithm
  ecdh-sha2-nistp384             ECDH_SHA2_P384 ecdh key exchange algorithm
  ecdh-sha2-nistp521             ECDH_SHA2_P521 ecdh key exchange algorithm

Sw01(config)#ip ssh server algorithm mac ?
  hmac-sha1                      HMAC-SHA1 (digest length = 160 bits,key length
                                 = 160 bits)
  hmac-sha2-256                  HMAC-SHA2-256 (digest length = 256 bits, key
                                 length = 256 bits)
  hmac-sha2-256-etm@openssh.com  HMAC-SHA2-256-ETM (digest length = 256 bits,
                                 key length = 256 bits)
  hmac-sha2-512                  HMAC-SHA2-512 (digest length = 512 bits, key
                                 length = 512 bits)
  hmac-sha2-512-etm@openssh.com  HMAC-SHA2-512-ETM (digest length = 512 bits,
                                 key length = 512 bits)

Sw01(config)#&lt;/LI-CODE&gt;
&lt;P&gt;Options might vary with the software version you use, but you can adjust those algorithms as needed.&lt;/P&gt;
&lt;P&gt;HTH!&lt;/P&gt;</description>
      <pubDate>Fri, 05 Sep 2025 17:50:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-ssh-algorithms-on-cisco-switches/m-p/5327593#M1122590</guid>
      <dc:creator>Jens Albrecht</dc:creator>
      <dc:date>2025-09-05T17:50:31Z</dc:date>
    </item>
    <item>
      <title>Re: Disable SSH Algorithms on CISCO Switches</title>
      <link>https://community.cisco.com/t5/network-security/disable-ssh-algorithms-on-cisco-switches/m-p/5327599#M1122591</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1916377"&gt;@Clay Kolden - RTC&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P data-start="22" data-end="106"&gt;On IOS-XE you remove weak SSH options by explicitly defining the strong ones. Use:&lt;/P&gt;
&lt;UL data-start="108" data-end="291"&gt;
&lt;LI data-start="108" data-end="185"&gt;
&lt;P data-start="110" data-end="185"&gt;&lt;CODE data-start="110" data-end="141"&gt;ip ssh server algorithm kex …&lt;/CODE&gt; → pick only DH-group16/18 or ECDH (sha2).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="186" data-end="255"&gt;
&lt;P data-start="188" data-end="255"&gt;&lt;CODE data-start="188" data-end="219"&gt;ip ssh server algorithm mac …&lt;/CODE&gt; → allow only hmac-sha2 (256/512).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="256" data-end="291"&gt;
&lt;P data-start="258" data-end="291"&gt;Optionally set AES-CTR ciphers.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="293" data-end="383"&gt;After that, &lt;CODE data-start="305" data-end="335"&gt;show ip ssh server algorithm&lt;/CODE&gt; will confirm SHA1 and old DH groups are gone.&lt;/P&gt;
&lt;P data-start="385" data-end="424"&gt;–––&lt;BR data-start="388" data-end="391" /&gt;Best regards,&lt;BR data-start="404" data-end="407" /&gt;Stefan Mihajlov&lt;/P&gt;
&lt;P data-start="426" data-end="524" data-is-last-node="" data-is-only-node=""&gt;&lt;EM data-start="426" data-end="524" data-is-last-node=""&gt;Mark this post as Helpful if it helped you, and Accept as Solution if it resolved your question.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Sep 2025 18:47:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-ssh-algorithms-on-cisco-switches/m-p/5327599#M1122591</guid>
      <dc:creator>Stefan Mihajlov</dc:creator>
      <dc:date>2025-09-05T18:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: Disable SSH Algorithms on CISCO Switches</title>
      <link>https://community.cisco.com/t5/network-security/disable-ssh-algorithms-on-cisco-switches/m-p/5327607#M1122592</link>
      <description>&lt;P&gt;Hi Jens, Thanks for replying.&lt;BR /&gt;&lt;BR /&gt;My main issue and the reason I reached out is because the switch is not recognizing these commands. As shown Below. I am unaware of what exactly would be causing this.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ClayKoldenRTC_0-1757098560676.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/251466i7E4FADCCD7345200/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ClayKoldenRTC_0-1757098560676.png" alt="ClayKoldenRTC_0-1757098560676.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Sep 2025 18:56:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-ssh-algorithms-on-cisco-switches/m-p/5327607#M1122592</guid>
      <dc:creator>Clay Kolden - RTC</dc:creator>
      <dc:date>2025-09-05T18:56:28Z</dc:date>
    </item>
    <item>
      <title>Re: Disable SSH Algorithms on CISCO Switches</title>
      <link>https://community.cisco.com/t5/network-security/disable-ssh-algorithms-on-cisco-switches/m-p/5327612#M1122593</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1916377"&gt;@Clay Kolden - RTC&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;you need to enter global config mode for these commands.&lt;/P&gt;
&lt;P&gt;As you can see at my previous post the prompt looks like 'Sw01(config)#'.&lt;/P&gt;
&lt;P&gt;In order to get there you need the command 'configure terminal', the prompt will change to 'INSIDE-9300(Config)#' and then you can enter the commands I mentioned before.&lt;/P&gt;
&lt;P&gt;when you are done, you leave the global config mode with the command 'exit' and then save the configuration with the command 'copy running-config startup-config'.&lt;/P&gt;
&lt;P&gt;HTH!&lt;/P&gt;</description>
      <pubDate>Fri, 05 Sep 2025 19:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-ssh-algorithms-on-cisco-switches/m-p/5327612#M1122593</guid>
      <dc:creator>Jens Albrecht</dc:creator>
      <dc:date>2025-09-05T19:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: Disable SSH Algorithms on CISCO Switches</title>
      <link>https://community.cisco.com/t5/network-security/disable-ssh-algorithms-on-cisco-switches/m-p/5327616#M1122594</link>
      <description>&lt;P&gt;Sorry I missed you not enter config mode.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 05 Sep 2025 19:48:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-ssh-algorithms-on-cisco-switches/m-p/5327616#M1122594</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-09-05T19:48:01Z</dc:date>
    </item>
    <item>
      <title>Re: Disable SSH Algorithms on CISCO Switches</title>
      <link>https://community.cisco.com/t5/network-security/disable-ssh-algorithms-on-cisco-switches/m-p/5327654#M1122609</link>
      <description>&lt;P&gt;Ah, I see now. Thank you so much for your help!&lt;/P&gt;</description>
      <pubDate>Fri, 05 Sep 2025 20:51:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-ssh-algorithms-on-cisco-switches/m-p/5327654#M1122609</guid>
      <dc:creator>Clay Kolden - RTC</dc:creator>
      <dc:date>2025-09-05T20:51:10Z</dc:date>
    </item>
    <item>
      <title>Re: Disable SSH Algorithms on CISCO Switches</title>
      <link>https://community.cisco.com/t5/network-security/disable-ssh-algorithms-on-cisco-switches/m-p/5327661#M1122612</link>
      <description>&lt;P&gt;You're welcome! We are here to help.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Sep 2025 21:02:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-ssh-algorithms-on-cisco-switches/m-p/5327661#M1122612</guid>
      <dc:creator>Jens Albrecht</dc:creator>
      <dc:date>2025-09-05T21:02:00Z</dc:date>
    </item>
  </channel>
</rss>

