SSH | Recommendations

SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network. In addition to providing secure network services, SSH refers to the suite of utilities that implement the SSH protocol. Secure Shell provides strong password authentication and public key authentication, as well as encrypted data communications between two computers connecting over an open network, such as the internet. In addition to providing strong encryption, SSH is widely used by network administrators for managing systems and applications remotely, enabling them to log in to another computer over a network, execute commands and move files from one computer to another.

For many years the recommendation is to work with SSH instead of Telnet, but besides enabling SSH we can add some parameters to improve security.

Even using SSH we are subject to vulnerabilities in the protocols and algorithms it uses, so if your equipment / software allows it, add the parameters below to increase security in remote access.

#1) Create the key with at least 2048 bits. You can also use the 4096, which makes the connection a little slower, but it's more secure:

#2) Use SSHv2 whenever possible:

#3) Accept SSH on "line vty":

#4) Set the timeout and number of authentication attempts:

#5) Choose strong algorithms:

#6) When adding the user, use the secret word instead of the password:

#7) Limit the origin of accesses using ACL:

Checking the settings can be done with the "show ip ssh" command:

37 views0 comments

Recent Posts

See All

The Duo Authentication Proxy is an on-premises software service that receives authentication requests from your local devices and applications via RADIUS or LDAP, optionally performs primary authentic

This post provides a step-by-step procedure for installing the hot patch released by Cisco for ISE servers, in light of the recent Log4j vulnerability (Apache Log4j Java Logging Library). More details

We have already seen how Umbrella works in previous posts and now let's do the basic configuration. Configuration Mode on a VA Deployed: When you open the VA i