Is it possible with FortiGate security profiles to log what SSH Version is used and which algorithms are negotiated on a ssh connection? For Https connections it's possible to see the TLS version with normal certificate inspection and additionally the exchanged algorithms and parameters when using Deep Inspection. But for SSH I did not figure out how to get the exchanged algorithms and SSH version.
I tried SSL/SSH inspection with DeepSSH inspection and a SSH-Filter profile with all possible logging enabled. For my test policy all traffic is logged. I also applied an application control profile with SSH monitored. All I see in my logfiles is that there is a connection - and with SSH Filter enabled e.g. which commands where issued.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hello , please refer to the document
Hello Shashwati, thank you for your reply. The document you linked outlines monitoring (with e.g. wireshark) the SSH-Algorithms used when connecting to a FortiGate, if I understand correctly.
My question was about monitoring the algorithms used by to two hosts communicating over SSH where the traffic traverses the FortiGate. I would like to get the algorithms from my logfiles for the policy used by this two hosts, if possible. Sorry, if my question was unclear.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1705 | |
1093 | |
752 | |
446 | |
230 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.