Guest

Preview Tool

Cisco Bug: CSCvs58908 - Add Additional Key Exchange Algorithms to the SSH Client on Catalyst 9000 Series

Last Modified

Jan 07, 2020

Products (1)

  • Cisco IOS

Known Affected Releases

16.9.3

Description (partial)

Symptom:
This is an enhancement that is being filed to add support for stronger encryption methods within the SSH client on the Cisco Catalyst 9000 Series platform.

New command syntax will provide compatibility between the SSH client and SSH Servers that do not support diffie-hellman-group1-sha1 and diffie-hellman-group14-sha1 encryption methods.

Conditions:
SSH from a Catalyst 9300 to a SSH Server that does not support the current key exchange algorithms diffie-hellman-group-exchange-sha1 and diffie-hellman-group14-sha1 does not work.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.