SSH is available for a sub-set of Cisco routers. However, it is worth
logging onto the Cisco web-site because there have been weaknesses
identified in the SSH implementation. However, in later releases of IOS
these should have now been fixed. 

Here is a brief overview of SSH support taken from the Cisco website:

Summary

Four different Cisco product lines are susceptible to multiple
vulnerabilities discovered in the Secure Shell (SSH) protocol version
1.5. These issues have been addressed, and fixes have been integrated
into the Cisco products that support this protocol.
By exploiting the weakness in the SSH protocol, it is possible to insert
arbitrary commands into an established SSH session, collect information
that may help in brute force key recovery, or brute force a session key.


Affected product lines are: 

All devices running Cisco IOSŪ software supporting SSH. This includes
routers and switches running Cisco IOS software. 
Catalyst 6000 switches running CatOS. 
Cisco PIX Firewall. 
Cisco 11000 Content Service Switch family. 

No other Cisco products are vulnerable. 

It is possible to mitigate this vulnerability by preventing, or having
control over, the interception of SSH traffic.

Many of these vulnerabilities have now been closed in subsequent
software releases. All the information you will need to determine SSH
support and detailed security alerts is available at the following URL
http://www.cisco.com/warp/public/707/SSH-multiple-pub.html . This URL
also provides information on the devices which won't support SSH. 

I hope this helps.

Cheers,

Mark Searle
Executive Consultant
Network Solutions & OSS Integration
KPMG Service Provider Solutions
mailto:[EMAIL PROTECTED]







-----Original Message-----
From: Led Slinger [mailto:[EMAIL PROTECTED]]
Sent: 07 January 2002 16:23
To: [EMAIL PROTECTED]
Subject: Securing Access to Cisco Routers


I have been tasked with finding a solution to replace telnet for router 
access to a large group of Cisco Routers.  Is SSH available for Cisco 
Routers or does anyone have a preferred solution for doing away with 
the vulnerability associated with telnet and core infrastructure 
components?

Leds....

-- 
There's nothing wrong with Windows until you install it........


        Email Disclaimer

The information in this email is confidential and may be legally privileged.
It is intended solely for the addressee.  Access to this email by anyone else
is unauthorised.
If you are not the intended recipient, any disclosure, copying, distribution
or any action taken or omitted to be taken in reliance on it, is prohibited
and may be unlawful.  When addressed to our clients any opinions or advice
contained in this email are subject to the terms and conditions expressed in
the governing KPMG client engagement letter.

Reply via email to