Information
SSH is a secure, encrypted replacement for common login services such as
telnet, ftp, rlogin, rsh, and rcp.
*Rationale*
It is strongly recommended that sites abandon older clear-text login protocols
and use SSH to prevent session hijacking and sniffing of sensitive data off the network.If the ssh server is not installed the contents of this section are not required. You can check
the install status of the ssh server with the following command-# dpkg -s openssh-server9.3.1 Set SSH Protocol to 2Profile Applicability-. Level 1SSH supports two different and incompatible protocols- SSH1 and SSH2. SSH1 was the
original protocol and was subject to security issues. SSH2 is more advanced and secure.
*Rationale*
SSH v1 suffers from insecurities that do not affect SSH v2.
Solution
Edit the /etc/ssh/sshd_config file to set the parameter as follows-Protocol 2