08-12-2022 12:21 PM
Hi After changing key size to 2048 with below two commands, why it is still 1024? Thank you!
crypto key generate rsa modulus 2048
ip ssh dh min size 2048
#do sh ip ssh
SSH Enabled - version 2.0
Authentication methods:publickey,keyboard-interactive,password
Authentication Publickey Algorithms:x509v3-ssh-rsa,ssh-rsa
Hostkey Algorithms:x509v3-ssh-rsa,ssh-rsa
Encryption Algorithms:aes256-ctr,aes192-ctr,aes128-ctr
MAC Algorithms:hmac-sha1
KEX Algorithms:diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1
Authentication timeout: 60 secs; Authentication retries: 5
Minimum expected Diffie Hellman key size : 2048 bits
IOS Keys in SECSH format(ssh-rsa, base64 encoded): TP-self-signed-506
Modulus Size : 1024 bits
08-12-2022 01:20 PM
Minimum expected Diffie Hellman key size : 2048 bits - ? what is the issue ?
08-12-2022 03:12 PM
Thanks for your reply. the issue is the two command cannot work. after adding the two commands to change key size, the key size does not change.
08-13-2022 02:22 AM
i can see 2048 DH, what i am missing here ?
08-14-2022 04:42 AM
When you create a new RSA key (could even be 4096-bits) give it a name and then make sure that key name is bound to the ssh service. Here are a couple of guides for doing so with detailed examples:
https://community.cisco.com/t5/security-knowledge-base/guide-to-better-ssh-security/ta-p/3133344
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide