Description |
This article discusses the behavior that can occur with network infrastructure devices using legacy SSH ciphers. Vulnerable Diffie-Hellman SSH Ciphers were removed from versions 9.2.8, 9.4.4. 7.2.3 and greater. The removal of these ciphers can cause SSH communication to fail between FortiNAC and network devices still using these ciphers.
Depending upon the device, the resulting behavior can vary from failing L2 and L3 polling to failing VLAN switching. The following events would be generated for the affected device:
|
Scope | FortiNAC/CentOS v9.2.8, v9.4.4, v7.2.3 or greater, FortiNAC-F/FortiNAC-OS v7.2.3 or greater. |
Solution |
Workaround: The legacy ciphers must be re-added after the upgrade via the CLI. Use one of the following command options. Contact Support if assistance is required.
Option 1: Re-add the ciphers for all the device models in the specified device group.
CentOS (log in as root):
Option 2: Re-add the ciphers for a single device model IP address.
CentOS (log in as root):
Solution: To be addressed in FortiNAC versions v9.4.5, v7.2.5 and v7.4. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.