Managing SSH Devices with Security Cloud Control

Security Cloud Control (formerly Cisco Defense Orchestrator) allows you to manage devices through SSH. These are the features we support for those devices:

  • Onboard a SSH Device. You can use the username and password of a highly privileged user stored on the SSH device to onboard the device.

  • Viewing the device configuration. You can view the device configuration file.

  • Review policy and configuration changes from device. When you read the configuration file from the SSH device, it will be saved in Security Cloud Control's database.

  • Out-of-band change detection. When you enable Conflict Detection, Security Cloud Control checks the device every 10 minutes for changes to the device's configuration. If there is a change, the device's status will change to Conflict Detected and you will be able to resolve the conflict.

  • Command line interface support. You can issue all SSH device commands to the device through Security Cloud Control's command line interface.

  • Individual CLI commands and groups of commands can be turned into editable and reusable "macros." You can use the system-defined macros provided by Security Cloud Control and create your own macros for tasks you perform often.

  • Detect and manage SSH fingerprint changes. If any credentials or properties of the device change, and that causes a change to the SSH fingerprint, Security Cloud Control detects that change and gives you a chance to review and accept the new fingerprint.

  • Change Log. The change log captures all the commands you issue to the SSH device.