<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Check SSH version on WLC in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/check-ssh-version-on-wlc/m-p/4076094#M4507</link>
    <description>&lt;P&gt;I have already enabled high-cipher on SSH, but for security compliance, I need evidence to show that the only version of SSH enabled on WLC is version 2 only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to show this evidence?&lt;/P&gt;</description>
    <pubDate>Mon, 05 Jul 2021 18:59:51 GMT</pubDate>
    <dc:creator>ejlbarcelon</dc:creator>
    <dc:date>2021-07-05T18:59:51Z</dc:date>
    <item>
      <title>Check SSH version on WLC</title>
      <link>https://community.cisco.com/t5/wireless/check-ssh-version-on-wlc/m-p/4076094#M4507</link>
      <description>&lt;P&gt;I have already enabled high-cipher on SSH, but for security compliance, I need evidence to show that the only version of SSH enabled on WLC is version 2 only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to show this evidence?&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 18:59:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/check-ssh-version-on-wlc/m-p/4076094#M4507</guid>
      <dc:creator>ejlbarcelon</dc:creator>
      <dc:date>2021-07-05T18:59:51Z</dc:date>
    </item>
    <item>
      <title>Re: Check SSH version on WLC</title>
      <link>https://community.cisco.com/t5/wireless/check-ssh-version-on-wlc/m-p/4076104#M4508</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As per cisco FAQ, WLC only support SSH version 2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/wireless-lan-controller-software/118833-wlc-design-ftrs-faq.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/wireless-lan-controller-software/118833-wlc-design-ftrs-faq.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For verification you can sniff the packets.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Dont forget to rate helpful posts&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 06:34:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/check-ssh-version-on-wlc/m-p/4076104#M4508</guid>
      <dc:creator>Sandeep Choudhary</dc:creator>
      <dc:date>2020-04-29T06:34:48Z</dc:date>
    </item>
    <item>
      <title>Re: Check SSH version on WLC</title>
      <link>https://community.cisco.com/t5/wireless/check-ssh-version-on-wlc/m-p/4076126#M4509</link>
      <description>&lt;P&gt;Adding to Sandeep's response.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What version of AireOS are you running?&lt;/P&gt;
&lt;P&gt;If it is 8.6.x or above then when you enable high cipher option, then it uses sha2. Those ECDH key exchanges are supported only in SSHv2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"In Release 8.6, controllers are migrated from OpenSSH to libssh, and libssh does not support these key exchange (KEX) algorithms:&amp;nbsp;&lt;/SPAN&gt;&lt;EM class="ph i"&gt;ecdh-sha2-nistp384&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;and&amp;nbsp;&lt;/SPAN&gt;&lt;EM class="ph i"&gt;ecdh-sha2-nistp521&lt;/EM&gt;&lt;SPAN&gt;. &lt;EM&gt;&lt;STRONG&gt;Only&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;ecdh-sha2-nistp256&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;is supported&lt;/STRONG&gt;&lt;/EM&gt;."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is no CLI command to verify form WLC end.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Rasika&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 07:14:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/check-ssh-version-on-wlc/m-p/4076126#M4509</guid>
      <dc:creator>Rasika Nayanajith</dc:creator>
      <dc:date>2020-04-29T07:14:49Z</dc:date>
    </item>
    <item>
      <title>Re: Check SSH version on WLC</title>
      <link>https://community.cisco.com/t5/wireless/check-ssh-version-on-wlc/m-p/5172480#M275304</link>
      <description>&lt;P&gt;Hello Rasika, Thanks for your message, what if we are running lower version ie 8.6&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2024 14:29:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/check-ssh-version-on-wlc/m-p/5172480#M275304</guid>
      <dc:creator>schnkumar331</dc:creator>
      <dc:date>2024-09-06T14:29:47Z</dc:date>
    </item>
    <item>
      <title>Re: Check SSH version on WLC</title>
      <link>https://community.cisco.com/t5/wireless/check-ssh-version-on-wlc/m-p/5172490#M275306</link>
      <description>&lt;P&gt;Take a look at the configuration guide for the version you are curious about.&amp;nbsp; Then just search for the work cipher and see if that provides you with the information you need.&amp;nbsp; You can also use NMAP and have that query your device to see what ciphers are allowed. If you have NMAP installed you can run the following command:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;nmap --script ssh2-enum-algos -sV -p 22 &amp;lt;target_IP&amp;gt;&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 06 Sep 2024 15:00:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/check-ssh-version-on-wlc/m-p/5172490#M275306</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2024-09-06T15:00:07Z</dc:date>
    </item>
  </channel>
</rss>

