How to view the SSH cipher suites supported on the Firewall using non-Palo Alto Networks tools
11008
Created On 01/26/24 23:10 PM - Last Modified 05/14/24 20:29 PM
Objective
To view the SSH cipher suites supported on firewall management interface using Nmap (Linux) Zenmap (Windows) and Putty
Environment
- Palo Alto Firewalls
- Supported PAN-OS
- SSH Cipher Suites
Procedure
- Using Nmap in Linux
Run the command below:
Nmap --script ssh2-enum-algos -sV -p 22 <your_firewall_ip>
- Zenmap on Windows
- Zenmap can be downloaded here
- Add the command "nmap --script ssh2-enum-algos -sV -p 22" in the command field and the target IP address in the target field. Zenmap will automatically add the target IP address in the command field. If you manually add the target IP address in the command line, the scan may not work
- Putty
- Putty can be downloaded here
- Follow these 4 steps
- Under session > logging, select SSH packets and raw data
- Add the log name under Log file name (the default name is putty.log)
- Connect to the Firewall management interface via ssh using putty under Session
- Open the logs downloaded in the client.
- The logs should have the SSH packets, and review the Incoming raw data.
Additional Information
Note: This article is written for informational purposes only. Palo Alto Networks does not support any third-party operating systems or tools.