06-01-2025 08:36 AM
Qualys scans of our FMC and FTD are flagging older SSH protocols and algorithms that we need to turn off. I looked into enabling UCAPL/CC mode but the one-way nature of this change kind of scares me. Besides, I feel like all I need is to tweak the /etc/ssh/sshd_config file a bit and if there are any ill effects it would be easy to roll back. What I need is this:
on FMC: remove host key algorithm ssh-rsa
on FTD: remove host key algorithm ssh-rsa, MAC hmac-sha1, key exchange diffie-hellman-group14-sha1
The FTDs are running v7.4.2 and the FMC is at v7.6.0
Has anybody played around with this? Should I open a TAC case? Thoughts?
TIA,
06-01-2025 09:23 AM
- Note that the FTD CLI has a command configure ssh-access-list to limit the IP addresses from which an FTD device will accept SSH connections on its management interface , which is always good practice for network managers (management)
M.
06-01-2025 09:54 AM
@tato386 I am not sure there is an officially supported way of doing this, it's probably best contacting TAC to confirm.
You can limit the attack surface by disabling SSH on data interfaces (FTD) and only allow SSH access on the management interface, restricting access using the ACL as already mentioned.
06-01-2025 10:15 AM
I agree with @Rob Ingram, probably the safest way would be to raise this with TAC. However, if you have a console connection to the devices to revert back the applied changes then I can't see why you shouldn't give it a try.
With regard to CC/UCAPL, you're right, once you enable them you wouldn't be able to revert back. However, I think TAC could still be able to do that for you.
06-01-2025 10:42 AM
These suggestions are valid and useful but in our situation the Qualys scanner is located *inside* our firewall and has access to management interfaces. With the FTD I can use the platform settings to limit SSH to individual IPs which is annoying but doable. The FMC has no platform settings and I don't see anything in the config screen to restrict inbound SSH. For these reasons I think it's just more efficient to disable the deprecated protocols at the OS level and be done with it. No IPs lists to manage or extra settings, etc..
06-01-2025 11:07 AM
quick update: just realized I can use "access list" in FMC config to limit SSH by IP. I would still prefer to simply disable these older algorithms but I guess for now that's probably the best option. Thanks all
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide