Thursday, February 16, 2012

How to disable SSH version 1 on a Cisco ASA

I had a customer come to me and ask me to disable SSH version 1 on their Cisco ASA firewall because they were in the process of having a vulnerability scan run on their network.  Ok, not big deal, but I thought Id show a couple of neat things. 
First, how do we disable SSH version 1 and only allow SSH version 2?  Like this:  "ssh version 2" in config mode.  Thats it.
So, with that said, you can also look at your current SSH sessions to see what version people are using.  Lets first look at version 1.  I am a little confused about one thing in particular.  Notice that under the "version" tab, it says "1.5".  I understand this as version 1, but Im not sure what it means to have version 1.5.  I haven't figured that out at the time of this writing, and Im not sure I care.  I just need version 1.anything disabled.  Here is what it looks like:
"sho ssh session"
SID Client IP       Version Mode Encryption Hmac     State            Username
1   24.196.3.248    1.5     -    3DES       -        SessionStarted       sk

Now, with version 2, it looks like this:
"sho ssh session"
SID Client IP       Version Mode Encryption Hmac     State            Username
1   24.196.3.248    2.0     IN   aes256-cbc sha1     SessionStarted   sk
                                       OUT  aes256-cbc sha1     SessionStarted   sk

Notice the differences.  The main thing is the encryption algorithm.  aes256 and SHA is much stronger than 3DES.