<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Does your IPS show this when in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-protocol-version-1-session-key-vulnerability/m-p/2826197#M44422</link>
    <description>&lt;P&gt;Does your IPS show this when you connect to your ASA? Or for other access?&lt;/P&gt;
&lt;P&gt;In general: Make sure that all SSH-servers only accept ssh version 2.&lt;/P&gt;
&lt;P&gt;For the configuration of SSH on ASA and IOS you can look at&amp;nbsp;the following document:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportforums.cisco.com/document/12338141/guide-better-ssh-security"&gt;https://supportforums.cisco.com/document/12338141/guide-better-ssh-security&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For other devices, follow the respective documentation.&lt;/P&gt;</description>
    <pubDate>Wed, 25 Nov 2015 22:09:53 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2015-11-25T22:09:53Z</dc:date>
    <item>
      <title>•	SSH Protocol Version 1 Session Key Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/ssh-protocol-version-1-session-key-vulnerability/m-p/2826196#M44421</link>
      <description>&lt;P&gt;Hi we have a ASA-5585 and the IPS show us a vulnerability &lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif';"&gt;SSH Protocol Version 1 Session Key.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif';"&gt;How We do to mitigate that?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:30:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-protocol-version-1-session-key-vulnerability/m-p/2826196#M44421</guid>
      <dc:creator>mario-palma</dc:creator>
      <dc:date>2019-03-10T13:30:33Z</dc:date>
    </item>
    <item>
      <title>Does your IPS show this when</title>
      <link>https://community.cisco.com/t5/network-security/ssh-protocol-version-1-session-key-vulnerability/m-p/2826197#M44422</link>
      <description>&lt;P&gt;Does your IPS show this when you connect to your ASA? Or for other access?&lt;/P&gt;
&lt;P&gt;In general: Make sure that all SSH-servers only accept ssh version 2.&lt;/P&gt;
&lt;P&gt;For the configuration of SSH on ASA and IOS you can look at&amp;nbsp;the following document:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportforums.cisco.com/document/12338141/guide-better-ssh-security"&gt;https://supportforums.cisco.com/document/12338141/guide-better-ssh-security&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For other devices, follow the respective documentation.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 22:09:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-protocol-version-1-session-key-vulnerability/m-p/2826197#M44422</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-11-25T22:09:53Z</dc:date>
    </item>
  </channel>
</rss>

