<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable weak cipher suite in  SSH in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suite-in-ssh/m-p/444328#M100330</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;:&amp;nbsp; Thank you.&amp;nbsp; Can you also elaborate on the SSH service profile?&amp;nbsp; How do I go about doing this?&lt;/P&gt;</description>
    <pubDate>Fri, 29 Oct 2021 13:18:53 GMT</pubDate>
    <dc:creator>dtran</dc:creator>
    <dc:date>2021-10-29T13:18:53Z</dc:date>
    <item>
      <title>Disable weak cipher suite in  SSH</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suite-in-ssh/m-p/444139#M100300</link>
      <description>&lt;P&gt;I would like to disable weak cipher suite in SSH for over 100+ Firewalls with the following commands.&amp;nbsp; The firewalls are running in High-Availability (H/A) mode, version 9.1.10:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;configure&lt;BR /&gt;set deviceconfig system ssh ciphers mgmt aes256-ctr&lt;BR /&gt;set deviceconfig system ssh ciphers mgmt aes256-gcm&lt;BR /&gt;set deviceconfig system ssh default-hostkey mgmt key-type ECDSA 256&lt;BR /&gt;set deviceconfig system ssh regenerate-hostkeys mgmt key-type ECDSA key-length 256&lt;BR /&gt;set deviceconfig system ssh mac mgmt hmac-sha2-256&lt;BR /&gt;set deviceconfig system ssh mac mgmt hmac-sha2-512&lt;BR /&gt;set deviceconfig system ssh kex mgmt ecdh-sha2-nistp521&lt;/P&gt;&lt;P&gt;commit&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;set ssh service-restart mgmt&lt;BR /&gt;exit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to do this via script.&amp;nbsp; However, when I look at PAN knowledgeable base, I see this:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PN5bCAG&amp;amp;lang=en_US" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PN5bCAG&amp;amp;lang=en_US&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HAsiCAG" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HAsiCAG&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The solution provided is not scalable in my environment.&amp;nbsp; Is there a better way?&amp;nbsp; How do Managed Service Providers (MSP) handle this with lot of PAN firewalls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Oct 2021 17:14:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suite-in-ssh/m-p/444139#M100300</guid>
      <dc:creator>dtran</dc:creator>
      <dc:date>2021-10-28T17:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher suite in  SSH</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suite-in-ssh/m-p/444170#M100305</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I'm sure there are several ways to perform this task. Perhaps say a loop and feed it the list of firewalls?&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 28 Oct 2021 20:23:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suite-in-ssh/m-p/444170#M100305</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-10-28T20:23:08Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher suite in  SSH</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suite-in-ssh/m-p/444201#M100310</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/41973"&gt;@dtran&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is disappointing that these changes cannot be pushed from Panorama.&amp;nbsp; However, you can push an SSH Service Profile and apply it to the management interface that effectively blocks those protocols.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With regard to the CLI, here is a similar (solved) thread -&amp;gt; &lt;A href="https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/td-p/388126" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/td-p/388126&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 28 Oct 2021 22:47:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suite-in-ssh/m-p/444201#M100310</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2021-10-28T22:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher suite in  SSH</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suite-in-ssh/m-p/444310#M100325</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;:&amp;nbsp; The thread you mentioned can not be done via scripting.&amp;nbsp; If you read closely, it stated "require console".&amp;nbsp; Unfortunately, console is NOT available in AWS.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Oct 2021 10:59:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suite-in-ssh/m-p/444310#M100325</guid>
      <dc:creator>dtran</dc:creator>
      <dc:date>2021-10-29T10:59:05Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher suite in  SSH</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suite-in-ssh/m-p/444313#M100326</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/41973"&gt;@dtran&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Correct.&amp;nbsp; I added it for your reference, not as a solution.&amp;nbsp; Theoretically, the commands can be done via SSH, but I would not close the current SSH session without testing with a new SSH session.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Fri, 29 Oct 2021 11:11:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suite-in-ssh/m-p/444313#M100326</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2021-10-29T11:11:21Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher suite in  SSH</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suite-in-ssh/m-p/444328#M100330</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;:&amp;nbsp; Thank you.&amp;nbsp; Can you also elaborate on the SSH service profile?&amp;nbsp; How do I go about doing this?&lt;/P&gt;</description>
      <pubDate>Fri, 29 Oct 2021 13:18:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suite-in-ssh/m-p/444328#M100330</guid>
      <dc:creator>dtran</dc:creator>
      <dc:date>2021-10-29T13:18:53Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher suite in  SSH</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suite-in-ssh/m-p/444329#M100331</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/41973"&gt;@dtran&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sure!&amp;nbsp; This feature was introduced in 10.0.&amp;nbsp; Create the profile under Device &amp;gt; Certificate Management &amp;gt; SSH Service Profile, and apply it under Device &amp;gt; Setup &amp;gt; Management &amp;gt; SSH Management Profile Setting.&amp;nbsp; You configure what algorithms are allowed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/certificate-management/configure-an-ssh-service-profile" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/certificate-management/configure-an-ssh-service-profile&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Fri, 29 Oct 2021 13:27:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suite-in-ssh/m-p/444329#M100331</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2021-10-29T13:27:35Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher suite in  SSH</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suite-in-ssh/m-p/444332#M100332</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;:&amp;nbsp; Unfortunately, that will not help me.&amp;nbsp; I am currently running 9.1.10, and we're not going to 10.x anytime soon &lt;span class="lia-unicode-emoji" title=":frowning_face:"&gt;☹️&lt;/span&gt;.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Oct 2021 13:33:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suite-in-ssh/m-p/444332#M100332</guid>
      <dc:creator>dtran</dc:creator>
      <dc:date>2021-10-29T13:33:02Z</dc:date>
    </item>
  </channel>
</rss>

