<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable weak cipher suites for SSL/TLS and SSH in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/411752#M92759</link>
    <description>&lt;P&gt;I was able to remove weak ciphers but it is now impossible to SSH into the device at all.&lt;/P&gt;&lt;P&gt;When looking at config audit in GUI I see this:&lt;/P&gt;&lt;P&gt;&amp;lt;ssh&amp;gt;&lt;BR /&gt;&amp;lt;ciphers&amp;gt;&lt;BR /&gt;&amp;lt;mgmt&amp;gt;&lt;BR /&gt;&amp;lt;aes256-ctr/&amp;gt;&lt;BR /&gt;&amp;lt;aes256-gcm/&amp;gt;&lt;BR /&gt;&amp;lt;/mgmt&amp;gt;&lt;BR /&gt;&amp;lt;/ciphers&amp;gt;&lt;BR /&gt;&amp;lt;default-hostkey&amp;gt;&lt;BR /&gt;&amp;lt;mgmt&amp;gt;&lt;BR /&gt;&amp;lt;key-type&amp;gt;&lt;BR /&gt;&amp;lt;ECDSA&amp;gt;256&amp;lt;/ECDSA&amp;gt;&lt;BR /&gt;&amp;lt;/key-type&amp;gt;&lt;BR /&gt;&amp;lt;/mgmt&amp;gt;&lt;BR /&gt;&amp;lt;/default-hostkey&amp;gt;&lt;BR /&gt;&amp;lt;regenerate-hostkeys&amp;gt;&lt;BR /&gt;&amp;lt;mgmt&amp;gt;&lt;BR /&gt;&amp;lt;key-type&amp;gt;&lt;BR /&gt;&amp;lt;ECDSA&amp;gt;&lt;BR /&gt;&amp;lt;key-length&amp;gt;256&amp;lt;/key-length&amp;gt;&lt;BR /&gt;&amp;lt;/ECDSA&amp;gt;&lt;BR /&gt;&amp;lt;/key-type&amp;gt;&lt;BR /&gt;&amp;lt;/mgmt&amp;gt;&lt;BR /&gt;&amp;lt;/regenerate-hostkeys&amp;gt;&lt;BR /&gt;&amp;lt;session-rekey&amp;gt;&lt;BR /&gt;&amp;lt;mgmt&amp;gt;&lt;BR /&gt;&amp;lt;interval&amp;gt;3600&amp;lt;/interval&amp;gt;&lt;BR /&gt;&amp;lt;/mgmt&amp;gt;&lt;BR /&gt;&amp;lt;/session-rekey&amp;gt;&lt;BR /&gt;&amp;lt;mac&amp;gt;&lt;BR /&gt;&amp;lt;mgmt&amp;gt;&lt;BR /&gt;&amp;lt;hmac-sha2-256/&amp;gt;&lt;BR /&gt;&amp;lt;hmac-sha2-512/&amp;gt;&lt;BR /&gt;&amp;lt;/mgmt&amp;gt;&lt;BR /&gt;&amp;lt;/mac&amp;gt;&lt;BR /&gt;&amp;lt;/ssh&amp;gt;&lt;/P&gt;&lt;P&gt;Are you still able to use putty to connect to cli? Did you have to make changes in putty to be able to?&lt;/P&gt;</description>
    <pubDate>Tue, 08 Jun 2021 13:35:33 GMT</pubDate>
    <dc:creator>pieters</dc:creator>
    <dc:date>2021-06-08T13:35:33Z</dc:date>
    <item>
      <title>Disable weak cipher suites for SSL/TLS and SSH</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/388126#M90458</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to&amp;nbsp;Disable weak cipher suites for SSL/TLS and SSH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;my question is, are the below commands correct ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do I need to run below commands on Active and Passive firewalls separately ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am using data port as management ( I do have dedicated management port with IP but not using it)&amp;nbsp; so below commands are still valid.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, I am on PAN OS 9.0.9.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;for SSL/TLS to disable weak Algorithm-&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;set shared ssl-tls-service-profile web-gui protocol-settings auth-algo-sha1 no&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;set shared ssl-tls-service-profile web-gui protocol-settings enc-algo-3des no&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;set shared ssl-tls-service-profile web-gui protocol-settings enc-algo-rc4 no&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;set shared ssl-tls-service-profile web-gui protocol-settings keyxchg-algo-rsa no&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;HOW TO FIX WEAK CIPHERS AND KEYS ON THE MANAGEMENT INTERFACE&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;gt; configure&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# delete deviceconfig system ssh&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# set deviceconfig system ssh ciphers mgmt aes256-ctr&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# set deviceconfig system ssh ciphers mgmt aes256-gcm&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# set deviceconfig system ssh default-hostkey mgmt key-type ECDSA 256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# set deviceconfig system ssh regenerate-hostkeys mgmt key-type ECDSA key-length 256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# set deviceconfig system ssh session-rekey mgmt interval 3600&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# set deviceconfig system ssh mac mgmt hmac-sha2-256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# set deviceconfig system ssh mac mgmt hmac-sha2-512&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# commit&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# exit&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;gt; set ssh service-restart mgmt&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;gt; configure&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# delete deviceconfig system ssh kex mgmt&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# set deviceconfig system ssh kex mgmt ecdh-sha2-nistp521&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# commit&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# exit&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;gt; set ssh service-restart mgmt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Reference:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Disable weak cipher suites for SSL/TLS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A title="Follow link" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CmqeCAC" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CmqeCAC&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Disable weak cipher for SSH&lt;BR /&gt;&lt;A title="Follow link" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PN5bCAG&amp;amp;lang=en_US%E2%80%A9" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PN5bCAG&amp;amp;lang=en_US%E2%80%A9&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/107710"&gt;@OwenFuller&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;Can you please help ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 20:55:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/388126#M90458</guid>
      <dc:creator>shafi021</dc:creator>
      <dc:date>2021-02-26T20:55:41Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher suites for SSL/TLS and SSH</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/388193#M90461</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/139406"&gt;@shafi021&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;From a quick glance, that all looks correct and like you pulled it off of the linked KBs. Some commands referenced may not do anything if you are using default settings (&lt;SPAN&gt;delete deviceconfig system ssh as an example) but it'll just tell you the object doesn't exist. I would recommend against doing this&amp;nbsp;change without direct console access to the device however.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As for the Active/Passive, yes this needs to be done on both as some of what you are changing is device specific and won't be replicated to the peer unit.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 21:17:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/388193#M90461</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-02-26T21:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher suites for SSL/TLS and SSH</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/388194#M90462</link>
      <description>&lt;P&gt;Thank you so much&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp; Yes, I am going to have console.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just in case, if something goes wrong, how should I delete the given commands? Just put Delete in front of them ?&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 21:24:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/388194#M90462</guid>
      <dc:creator>shafi021</dc:creator>
      <dc:date>2021-02-26T21:24:01Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher suites for SSL/TLS and SSH</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/388845#M90551</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp; I applied the above config and all went well. Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Mar 2021 14:20:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/388845#M90551</guid>
      <dc:creator>shafi021</dc:creator>
      <dc:date>2021-03-03T14:20:05Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher suites for SSL/TLS and SSH</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/411752#M92759</link>
      <description>&lt;P&gt;I was able to remove weak ciphers but it is now impossible to SSH into the device at all.&lt;/P&gt;&lt;P&gt;When looking at config audit in GUI I see this:&lt;/P&gt;&lt;P&gt;&amp;lt;ssh&amp;gt;&lt;BR /&gt;&amp;lt;ciphers&amp;gt;&lt;BR /&gt;&amp;lt;mgmt&amp;gt;&lt;BR /&gt;&amp;lt;aes256-ctr/&amp;gt;&lt;BR /&gt;&amp;lt;aes256-gcm/&amp;gt;&lt;BR /&gt;&amp;lt;/mgmt&amp;gt;&lt;BR /&gt;&amp;lt;/ciphers&amp;gt;&lt;BR /&gt;&amp;lt;default-hostkey&amp;gt;&lt;BR /&gt;&amp;lt;mgmt&amp;gt;&lt;BR /&gt;&amp;lt;key-type&amp;gt;&lt;BR /&gt;&amp;lt;ECDSA&amp;gt;256&amp;lt;/ECDSA&amp;gt;&lt;BR /&gt;&amp;lt;/key-type&amp;gt;&lt;BR /&gt;&amp;lt;/mgmt&amp;gt;&lt;BR /&gt;&amp;lt;/default-hostkey&amp;gt;&lt;BR /&gt;&amp;lt;regenerate-hostkeys&amp;gt;&lt;BR /&gt;&amp;lt;mgmt&amp;gt;&lt;BR /&gt;&amp;lt;key-type&amp;gt;&lt;BR /&gt;&amp;lt;ECDSA&amp;gt;&lt;BR /&gt;&amp;lt;key-length&amp;gt;256&amp;lt;/key-length&amp;gt;&lt;BR /&gt;&amp;lt;/ECDSA&amp;gt;&lt;BR /&gt;&amp;lt;/key-type&amp;gt;&lt;BR /&gt;&amp;lt;/mgmt&amp;gt;&lt;BR /&gt;&amp;lt;/regenerate-hostkeys&amp;gt;&lt;BR /&gt;&amp;lt;session-rekey&amp;gt;&lt;BR /&gt;&amp;lt;mgmt&amp;gt;&lt;BR /&gt;&amp;lt;interval&amp;gt;3600&amp;lt;/interval&amp;gt;&lt;BR /&gt;&amp;lt;/mgmt&amp;gt;&lt;BR /&gt;&amp;lt;/session-rekey&amp;gt;&lt;BR /&gt;&amp;lt;mac&amp;gt;&lt;BR /&gt;&amp;lt;mgmt&amp;gt;&lt;BR /&gt;&amp;lt;hmac-sha2-256/&amp;gt;&lt;BR /&gt;&amp;lt;hmac-sha2-512/&amp;gt;&lt;BR /&gt;&amp;lt;/mgmt&amp;gt;&lt;BR /&gt;&amp;lt;/mac&amp;gt;&lt;BR /&gt;&amp;lt;/ssh&amp;gt;&lt;/P&gt;&lt;P&gt;Are you still able to use putty to connect to cli? Did you have to make changes in putty to be able to?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jun 2021 13:35:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/411752#M92759</guid>
      <dc:creator>pieters</dc:creator>
      <dc:date>2021-06-08T13:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher suites for SSL/TLS and SSH</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/411917#M92776</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Yes&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/37546" target="_blank"&gt;@pieters&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;, I believe you must have had end the session after making changes and didn't restart the ssh service using "&lt;/SPAN&gt;&lt;SPAN&gt;set ssh service-restart mgmt"&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;You should not close the SSH session until you restart it.&lt;BR /&gt;&lt;BR /&gt;You need to console now to restart the SSH service and Cli will start working.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Always make sure you have console connected while making changes.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jun 2021 21:17:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/411917#M92776</guid>
      <dc:creator>shafi021</dc:creator>
      <dc:date>2021-06-08T21:17:47Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher suites for SSL/TLS and SSH</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/411980#M92784</link>
      <description>&lt;P&gt;Hey Shafi01, thanks for the quick reply.&lt;BR /&gt;I don't think that is it because the change only becomes in effect after restarting the service (which I definately did).&lt;/P&gt;&lt;P&gt;Since I locked myself out of CLI, you would think I indeed need console access but I did the following to revert the change:&lt;/P&gt;&lt;P&gt;1. export the running config as xml from GUI and delete the ssh section mentioned under &amp;lt;deviceconfig&amp;gt; &amp;lt;system&amp;gt;&lt;/P&gt;&lt;P&gt;2. import the modified config back into the fw and commit&lt;/P&gt;&lt;P&gt;3. login to the fw with a browser and go to /api&lt;/P&gt;&lt;P&gt;4. browse to&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://10.132.1.33/php/rest/browse.php/op" target="_blank"&gt;&lt;SPAN class="text"&gt;Operational Commands&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://10.132.1.33/php/rest/browse.php/op::set" target="_blank"&gt;&lt;SPAN class="text"&gt;set&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://10.132.1.33/php/rest/browse.php/op::set::ssh" target="_blank"&gt;&lt;SPAN class="text"&gt;ssh&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://10.132.1.33/php/rest/browse.php/op::set::ssh::service-restart" target="_blank"&gt;&lt;SPAN class="text"&gt;service-restart&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="text"&gt;&lt;A href="https://10.132.1.33/php/rest/browse.php/op::set::ssh::service-restart::mgmt" target="_blank"&gt;mgmt&lt;/A&gt;&amp;nbsp;and click the submit button&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="text"&gt;Step 1 and 2 can also be achieved through api by browsing to&amp;nbsp;&lt;SPAN&gt;&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://10.132.1.33/php/rest/browse.php/config" target="_blank"&gt;Configuration Commands&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://10.132.1.33/php/rest/browse.php/config::devices" target="_blank"&gt;devices&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://10.132.1.33/php/rest/browse.php/config::devices::entry%5B%40name%3D%27localhost%252Elocaldomain%27%5D" target="_blank"&gt;entry[@name='localhost.localdomain']&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://10.132.1.33/php/rest/browse.php/config::devices::entry%5B%40name%3D%27localhost%252Elocaldomain%27%5D::deviceconfig" target="_blank"&gt;deviceconfig&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://10.132.1.33/php/rest/browse.php/config::devices::entry%5B%40name%3D%27localhost%252Elocaldomain%27%5D::deviceconfig::system" target="_blank"&gt;system&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://10.132.1.33/php/rest/browse.php/config::devices::entry%5B%40name%3D%27localhost%252Elocaldomain%27%5D::deviceconfig::system::ssh" target="_blank"&gt;ssh&lt;/A&gt;&amp;nbsp;and then copy paste the restAPI url shown at the bottom but replace "action=get" with "action=delete"&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jun 2021 07:15:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/411980#M92784</guid>
      <dc:creator>pieters</dc:creator>
      <dc:date>2021-06-09T07:15:03Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher suites for SSL/TLS and SSH</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/421187#M93927</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;If we use this command "&lt;SPAN&gt;HOW TO FIX WEAK CIPHERS AND KEYS ON THE MANAGEMENT INTERFACE&lt;/SPAN&gt;"&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;gt; configure&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# delete deviceconfig system ssh&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# set deviceconfig system ssh ciphers mgmt aes256-ctr&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# set deviceconfig system ssh ciphers mgmt aes256-gcm&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# set deviceconfig system ssh default-hostkey mgmt key-type ECDSA 256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# set deviceconfig system ssh regenerate-hostkeys mgmt key-type ECDSA key-length 256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# set deviceconfig system ssh session-rekey mgmt interval 3600&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# set deviceconfig system ssh mac mgmt hmac-sha2-256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# set deviceconfig system ssh mac mgmt hmac-sha2-512&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# commit&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# exit&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;gt; set ssh service-restart mgmt&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;gt; configure&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# delete deviceconfig system ssh kex mgmt&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# set deviceconfig system ssh kex mgmt ecdh-sha2-nistp521&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# commit&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# exit&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;gt; set ssh service-restart mgmt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;afterthat i still ssh to Palo alto right, I don't know if i will configuration this after that i can ssh.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;thank you&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jul 2021 04:44:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/421187#M93927</guid>
      <dc:creator>nfsfantasy</dc:creator>
      <dc:date>2021-07-22T04:44:29Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher suites for SSL/TLS and SSH</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/548508#M111986</link>
      <description>&lt;P&gt;After running the command to disable the identified weak ciphers, how can you tell its turned off because when you go back and issue the command&amp;nbsp;set shared ssl-tls-service-profile FW-MGMT protocol-settings &amp;lt;tab&amp;gt;, they are all still there in the list...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2023 07:52:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/548508#M111986</guid>
      <dc:creator>JHALL3</dc:creator>
      <dc:date>2023-07-07T07:52:49Z</dc:date>
    </item>
  </channel>
</rss>

