Managing SSH Devices with Cisco Defense Orchestrator

Cisco Defense Orchestrator allows you to manage devices through SSH. These are the features we support for those devices:

  • Onboard a SSH Device. You can use the username and password of a highly privileged user stored on the SSH device to onboard the device.

  • Viewing the device configuration. You can view the device configuration file.

  • Review policy and configuration changes from device. When you read the configuration file from the SSH device, it will be saved in CDO's database.

  • Out-of-band change detection. When you enable Conflict Detection, CDO checks the device every 10 minutes for changes to the device's configuration. If there is a change, the device's status will change to Conflict Detected and you will be able to resolve the conflict.

  • Command line interface support. You can issue all SSH device commands to the device through CDO's command line interface.

  • Individual CLI commands and groups of commands can be turned into editable and reusable "macros." You can use the system-defined macros provided by CDO and create your own macros for tasks you perform often.

  • Detect and manage SSH fingerprint changes. If any credentials or properties of the device change, and that causes a change to the SSH fingerprint, CDO detects that change and gives you a chance to review and accept the new fingerprint.

  • Change Log. The change log captures all the commands you issue to the SSH device.