- Products
- Learn
- Local User Groups
- Partners
- More
Maestro Masters
Round Table session with Maestro experts
Hi All,
We had to close the vulnerabilities on 44k appliance Active and Standby firewall. The Vulnerability is SSH Weak MAC Algorithms Supported. To close this vulnerability I performed one SK article sk106031 and followed the below steps:-
"For Scalable Platform, adding the 2 lines to /etc/ssh/ssh_config will result in an error "No matching cipher found" when attempting to SSH to an SSM. Only add these 2 lines to /etc/ssh/sshd_config.
Ciphers aes128-ctr,aes192-ctr,aes256-ctr
MACs hmac-sha1
After modifying sshd_config, copy this file to each SGM ( expert# asg_cp2blades -b all sshd_config ) and then restart SSHD (expert# g_all service sshd restart)"
After adding above two lines in the sshd_config file in Active firewall and i ran the command ( expert# asg_cp2blades -b all sshd_config ) and retstart the sshd services and close the session.
After that we were not able to take SSH access of both Active and Standby firewall.
Please provide any solution so that reslove this issue.
You need to restore the original files. Most likely, you have made a typo that is causing SSH to crash. Get console connection and restore the files manually. I hope you did back them up before making changes
Hi,
I don't have backup file. Is there any other way?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
18 | |
3 | |
2 | |
2 | |
2 | |
1 | |
1 | |
1 | |
1 | |
1 |
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY