Description |
This article describes how to customize SSH authentication attributes in FortiNAC. Certain network devices may require security algorithms no longer enabled by default due to vulnerabilities. This can cause SSH communication to fail between FortiNAC and network devices still using these algorithms. |
||||||||||||||||||||||
Scope | FortiNAC v9.2.7, v9.4.2, v7.2.0 and greater. | ||||||||||||||||||||||
Solution |
Use the CLI commands in the table below to retrieve a list of currently supported algorithms in FortiNAC.
CentOS: Log in as root. FortiNAC-OS: Log in as admin.
Configure FortiNAC to use the required algorithms when communicating via SSH to specific devices. These customizations must be configured through the appliance CLI. Contact support for assistance.
Run the following command and refer to the parameters below: CentOS.
device -ip <device IP> -setAttr -name <name> -value <value>
FortiNAC-OS.
execute enter-shell device -ip <device IP> -setAttr -name <name> -value <value>
Example 1: Override the default kex list:
device -ip 10.12.228.126 -setAttr -name SSH_KEX -value "diffie-hellman-group1-sha1 diffie-hellman-group14-sha1"
Example 2: Enable keyboard-interactive:
device -ip 10.12.228.126 -setAttr -name SSH_KBD_ENABLED -value true
Example 3: Remove or restore default settings (remove attribute):
device -ip 10.12.228.126 -delAttr -name SSH_KBD_ENABLED |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.