Updated Fortinet FortiOS (markdown)

Mathieu Simon 2023-09-12 12:27:10 +02:00
parent 5d061fc2ca
commit 95fdf97c64

@ -50,12 +50,12 @@ end
**References** **References**
* [Fortinet document library: FortiGate / FortiOS 7.0.0 > New Features > Enabling individual ciphers in the SSH administrative access protocol](https://docs.fortinet.com/document/fortigate/7.0.0/new-features/765236/enabling-individual-ciphers-in-the-ssh-administrative-access-protocol-7-0-2) * [Fortinet document library: FortiGate / FortiOS 7.0.0 > New Features > Enabling individual ciphers in the SSH administrative access protocol](https://docs.fortinet.com/document/fortigate/7.0.0/new-features/765236/enabling-individual-ciphers-in-the-ssh-administrative-access-protocol-7-0-2)
* [Fortinet document library: FortiGate / FortiOS 7.0.2 CLI Reference > CLI reference > config system global](https://docs.fortinet.com/document/fortigate/7.0.2/cli-reference/1620) * [Fortinet document library: FortiGate / FortiOS 7.0.2 > CLI reference > config system global](https://docs.fortinet.com/document/fortigate/7.0.2/cli-reference/1620)
* [Fortinet document library: FortiGate / FortiOS 7.0.1 CLI Reference > CLI reference > config system global](https://docs.fortinet.com/document/fortigate/7.0.1/cli-reference/1620) * [Fortinet document library: FortiGate / FortiOS 7.0.1 > CLI reference > config system global](https://docs.fortinet.com/document/fortigate/7.0.1/cli-reference/1620)
## FortiOS >= 5.6.0 <= 7.0.1 ## FortiOS >= 5.6.0 <= 7.0.1
Starting with _at least_ FortiOS 5.6.0 ``strong-crypto`` defaults to **enable** and SSHv1 defaults to disabled. Starting with FortiOS 5.6 ``strong-crypto`` defaults to **enable** while SSHv1 defaults to **disable** since __at least__ FortiOS 5.0.
``` ```
config system global config system global
@ -75,10 +75,9 @@ end
**References** **References**
* [Fortinet document library: FortiGate / FortiOS 6.4.0 > Hardening your FortiGate > Building security into FortiOS](http://docs.fortinet.com/document/fortigate/6.4.0/hardening-your-fortigate/995103/building-security-into-fortios) * [Fortinet document library: FortiGate / FortiOS 5.6.0 > CLI Reference](https://docs.fortinet.com/document/fortigate/5.6.0/cli-reference/307604): Page 569, ``strong-crypto`` defaults to **enable**
* [Fortinet document library: FortiGate / FortiOS 6.2.0 > Hardening your FortiGate > Building security into FortiOS](https://docs.fortinet.com/document/fortigate/6.0.0/hardening-your-fortigate/995103) * [Fortinet document library: FortiGate / FortiOS 5.4.0 > CLI Reference](https://docs.fortinet.com/document/fortigate/5.4.0/cli-reference/1620): Page 163-164, ``strong-crypto`` defaults to **disable**
* [Fortinet document library: FortiGate / FortiOS 6.0.0 > Hardening your FortiGate > Building security into FortiOS](https://docs.fortinet.com/document/fortigate/6.0.0/hardening-your-fortigate/995103) * [](https://docs.fortinet.com/document/fortigate/5.0.0/cli-reference/307604): Page 527, SSHv1 defaults to **disable**, this is the earliest reference, newer versions stick to the same default.
* [Fortinet document library: FortiGate / FortiOS 5.6.0 > Hardening your FortiGate](https://docs.fortinet.com/document/fortigate/5.6.0/hardening-your-fortigate/995103)
## Limitations ## Limitations