Thursday, 21 April 2011

MacBook


MacBook.

               

Is a line of Macintosh portable computers introduced in January 2006 by Apple Inc. It replaced the PowerBook G4 and was the second model to be announced in the Apple–Intel transition (after the iMac). Positioned at the high end of the MacBook family, the MacBook Pro is currently produced in three sizes: the 13-, 15-, and 17- inch. There have been two designs for the MacBook Pro, both using aluminum. The first design was largely a carry-over from the PowerBook G4 and used the Intel Corecentral processing units as opposed to the PowerPC G4 chips used in the model it replaced. It was first released as a 15-inch model in January 2006, followed by a 17-inch model in April of the same year. These original models received several updates and were upgraded with Core 2 Duo processors in late 2006. The second "unibody" model has a more tapered design with most of the casing made from a single block of aluminum. This design was introduced with the 15-inch MacBook Pro in October 2008, along with the 13-inch aluminum unibody MacBook. The 17-inch model was updated with the same design the following January, also introducing the built-in battery that was later used in the rest of the MacBook Pro line from June 2009. Subsequent updates brought upgraded Intel Core i5 and i7processors and introduced Intel's Thunderbolt technology.
Discrete.

               

The original 15-inch MacBook Pro was announced on January 10, 2006 by Steve Jobs at theMacworld Conference & Expo. The 17-inch model was later unveiled on April 24, 2006. The first design was largely a carryover from the PowerBook G4 and utilized Intel Core CPUs as opposed to the PowerPC G4 chips used by its predecessor. It is 0.1 inches (0.25 cm) deeper, 0.4 inches (1.0 cm) wider, and 0.1 inches (0.25 cm) thinner than the 15-inch aluminum PowerBook G4, while weighing the same. Other changes from the PowerBook include a built-in iSightwebcam and the inclusion of MagSafe, a magnetic power connector designed to detach easily when pulled to prevent the entire laptop from being pulled off a surface. Both features were later brought over to the MacBook. In order to accommodate the slimmer form factor of the MacBook Pro, the speed of the optical drive was halved compared to that of the PowerBook G4 and dual layer DVD writing support was omitted. 
Both the original 15- and 17-inch discrete model MacBook Pros come with ExpressCard/34 slots, which replace the PC Card slots found in the PowerBook G4. All discrete 15-inch models have twoUSB 2.0 ports and one FireWire 400 port, while the 17-inch models have three USB 2.0 ports as well as one FireWire 400 port. When first introduced, the MacBook Pro did not come with FireWire 800 or S-Video ports, although FireWire 800 was added in the next 15-inch model revision and was present in every version of the 17-inch design. S-Video capability can be attained through the use of a DVI to S-Video adapter. External displays with up to a 2,560 × 1,600 pixel resolution are supported through a dual-link DVI port. All models include a built-in Gigabit Ethernet port, Bluetooth 2.0, and 802.11a/b/g. Later models include support for the draft 2.0 specification of 802.11n and Bluetooth 2.1


BlackBerry Internet Service


BlackBerry Internet Service.



The primary alternative to using BlackBerry Enterprise Server is to use the BlackBerry Internet Service. BlackBerry Internet Service, or BIS is available in 91 countries internationally. BlackBerry Internet Service was developed primarily for the average consumer rather than for the business consumer. BlackBerry Internet Service allows POP3 and IMAP email integration for an individual personal user. BlackBerry Internet Service allows up to 10 email accounts to be accessed, including many popular email accounts such as Gmail, Hotmail, Yahoo and AOL. BlackBerry Internet Service also allows for the function of the push capabilities in various other BlackBerry Applications. Various applications developed by RIM for BlackBerry utilize the push capabilities of BIS, such as the Instant Messaging clients, Google Talk, ICQ, Windows Live Messenger and Yahoo Messenger. Social Networks Facebook, Myspace and Twitter's notification system is accessed through BIS, allowing for push notifications for them.


BlackBerry Messenger.



Newer BlackBerry devices use the proprietary BlackBerry Messenger, also known as BBM, software for sending and receiving instant messages via BlackBerry PIN


Third-party software.

Third-party software available for use on BlackBerry devices includes full-featured database management systems, which can be used to support customer relationship management clients and other applications that must manage large volumes of potentially complex data. Photo Editor Suite developed by a Pakistani IT firm Five Rivers based in Lahore has become the best selling paid-for application for the BlackBerry. According to BlackBerry, the Photo Editor Suite had hit the top spot across all sectors on BlackBerry's AppWorld store and made its way to the number one spot


Nicknames.


BlackBerry is widely referred to as "CrackBerry", which is a reference to crack cocaine. Use of the term CrackBerry became so widespread that in November 2006 Webster's New World College Dictionary named "crackberry" the "New Word of the Year. A popular BlackBerry user forum is called crackberry.com

Operating system of BlackBerry




Operating system.


The operating system used by BlackBerry devices is a proprietary multitasking environment developed by RIM. The operating system is designed for use of input devices such as the track wheel, track ball, and track pad. The OS provides support for Java MIDP 1.0 and WAP 1.2. Previous versions allowed wireless synchronization with Microsoft Exchange Server e-mail and calendar, as well as with Lotus Domino e-mail. The current OS 5.0 provides a subset of MIDP 2.0, and allows complete wireless activation and synchronization with Exchange e-mail, calendar, tasks, notes and contacts, and adds support for Novell GroupWise and Lotus Notes. Blackberry Torch features Blackberry 6. Third-party developers can write software using these APIs, and proprietary BlackBerry APIs as well. Any application that makes use of certain restricted functionality must be digitally signed so that it can be associated to a developer account at RIM. This signing procedure guarantees the authorship of an application but does not guarantee the quality or security of the code. RIM provides tools for developing applications and themes for BlackBerry. Applications and themes can be loaded onto BlackBerry devices through BlackBerry App World, Over The Air (OTA) through the BlackBerry mobile browser, or through BlackBerry Desktop Manager.



CPU.
Early BlackBerry devices used Intel 80386-based processors. BlackBerry 8000 series smartphones, such as the 8700 and the Pearl, are based on the 312 MHz ARM XScale ARMv5TE PXA900. An exception to this is the BlackBerry 8707 which is based on the 80 MHz Qualcomm 3250 chipset; this was due to the PXA900 chipset not supporting 3G networks. The 80 MHz processor in the BlackBerry 8707 meant the device was often slower to download and render web pages over 3G than the 8700 was over EDGE networks. In May 2008 RIM introduced the BlackBerry 9000 series which are equipped with XScale 624 MHz processors. The BlackBerry Curve 8520 features a 512 MHz processor, while the Bold 9700 features a newer version of the Bold 9000's processor, but is clocked at the same speed.




BlackBerry Enterprise Server.



Connectivity





BlackBerry handhelds are integrated into an organization's e-mail system through a software package called BlackBerry Enterprise Server (BES). Versions of BES are available for Microsoft Exchange, Lotus Domino and Novell GroupWise. Google has made a Connector for BES which makes BES available for Google Apps as well. While individual users may be able to use a wireless provider's e-mail services without having to install BES themselves, organizations with multiple users usually run BES on their own network. Some third-party companies provide hosted BES solutions. Every BlackBerry has an ID called a BlackBerry PIN, which is used to identify the device to the BES. BlackBerry now provides a free BES software called BES Express. 

BES acts as an e-mail relay for corporate accounts so that users always have access to their e-mail. The software monitors the user's local Inbox, and when a new message comes in, it picks up the message and passes it to RIM's Network Operations Center (NOC). The messages are then relayed to the user's wireless provider, which in turn delivers them to the user's BlackBerry device. 

This is called push e-mail, because all new e-mails, contacts, task entries, memopad entries, and calendar entries are pushed out to the BlackBerry device automatically and instantaneously (as opposed to the user synchronizing the data manually or having the device poll the server at intervals). BlackBerry also supports polling email, which is how it supports POP. Device storage also enables the mobile user to access all data off-line in areas without wireless service. When the user reconnects to wireless service, the BES sends the latest data. 

An included feature in the newer models of the BlackBerry is the ability for it to quickly track your current location through trilateration without the use of GPS, thus saving battery life and time. Trilateration can be used as a quick, less battery intensive way to provide location-aware applications with the co-ordinates of the user. However, accuracy of BlackBerry trilateration is less than that of GPS due to a number of factors, including cell tower blockage by large buildings, mountains, or distance. 

BES also provides handhelds with TCP/IP connectivity accessed through a component called "Mobile Data Service - Connection Service" (MDS-CS). This allows for custom application development using data streams on BlackBerry devices based on the Sun Microsystems Java ME platform. 

In addition, BES provides network security, in the form of Triple DES or, more recently, AES encryption of all data (both e-mail and MDS traffic) that travels between the BlackBerry handheld and a BlackBerry Enterprise Server.

Most providers offer flat monthly pricing for unlimited data between BlackBerry units and BES. In addition to receiving e-mail, organizations can make intranets or custom internal applications with unmetered traffic.


With more recent versions of the BlackBerry platform, the MDS is no longer a requirement for wireless data access. Beginning with OS 3.8 or 4.0, BlackBerry handhelds can access the Internet (i.e. TCP/IP access) without an MDS - previously only e-mail and WAP access was possible without a BES/MDS. The BES/MDS is still required for secure e-mail, data access, and applications that require WAP from carriers that do not allow WAP access




About the BlackBerry


BlackBerry.


Is a line of mobile e-mail and smartphone devices developed and designed byCanadian company Research In Motion (RIM) since 1999. BlackBerry functions as a personal digital assistant with address book, calendar, memopad, and task list capabilities. It also functions as a portable media player with support for music and video playback and camera and video capabilities. BlackBerry is primarily known for its ability to send and receive (push) Internet e-mail wherever mobile network service coverage is present, or through Wi-Fi connectivity. BlackBerry phones possess a large array of messaging features, including auto-text, auto-correct, text prediction, support for many languages, keyboard shortcuts, text emoticons, and push notifications for many systems including email, Facebook, Twitter, Myspace, and Ebay; push instant messaging viaBlackBerry Messenger, Google Talk, ICQ, Windows Live Messenger, AOL Instant Messanger and Yahoo Messenger; threaded text messaging and a customizable indicator light near the top right of all BlackBerry devices. All notifications and conversations from applications are shown in a unified messaging application which third party applications can access. All data on the phone is compressed through BlackBerry Internet Service (BIS). BlackBerry Protect is a free application designed to help find your lost BlackBerry smartphone, and keep the information on it secure. It can also offer peace of mind for small businesses and families, with the ability to protect multiple smartphones BlackBerry commands a 14.8% share of worldwide smartphone sales, making it the fifth most popular device manufacturer after Nokia, Samsung, LG, and Apple. The consumer BlackBerry Internet Service is available in 91 countries worldwide on over 500 mobile service operators using various mobile technologies. Modern GSM-based BlackBerry handhelds incorporate an ARM 7, 9 or ARM 11 processor, while older BlackBerry 950 and 957 handhelds used Mudit 80386 processors. The latest GSM BlackBerry models (9100, 9300 and 9700 series) have an Intel PXA930 624 MHz processor, 256 MB (or 4 GB in the Torch 9800) flash memory and 265 MB SDRAM. CDMA BlackBerry smartphones are based on Qualcomm MSM6x00 chipsets which also include the ARM 9-based processor and GSM 900/1800 roaming (as the case with the 8830 and 9500) and include up to 256MB flash memory. The CDMA Bold 9650 is the first to have 512MB flash memory for applications. All BlackBerrys being made as of 2011 support up to 32 GB microSD cards.

History of BlackBerry

History of BlackBerry.

The first BlackBerry device, the 850, was introduced in 1999 as a two-way pager in Munich, Germany. In 2002, the more commonly known smartphone BlackBerry was released, which supports push e-mail, mobile telephone, text messaging, Internet faxing, Web browsing and other wireless information services. It is an example of a convergent device. The original BlackBerry devices, the RIM 850 and 857, used the DataTac network.
BlackBerry first made headway in the marketplace by concentrating on e-mail. RIM currently offers BlackBerry e-mail service to non-BlackBerry devices, such as the Palm Treo, through its BlackBerry Connect software.
The original BlackBerry device had a monochrome display, but all current models have color displays. All models except for the Storm, series had a built-in QWERTY keyboard, optimized for "thumbing", the use of only the thumbs to type. The Storm 1 and Storm 2 include aSureType keypad for typing. Originally, system navigation was achieved with the use of a scroll wheel mounted on the right side of phones prior to the 8700. The trackwheel was replaced by the trackball with the introduction of the Pearl series which allowed for 4 way scrolling. The trackball was replaced by the optical trackpad with the introduction of the Curve 8500 series. Models made to use iDEN networks such asNextel and Mike also incorporate a push-to-talk (PTT) feature, similar to a two-way radio

Wednesday, 6 April 2011

Password Recovery Procedure for the Cisco 1700 Series Routers

Introduction:
                      

                                                                                   


This document describes the procedure to recover an enable password or enable secret password. These passwords are used to protect access to privileged EXEC and configuration modes. The enable password can be recovered but the enable secret password is encrypted and can only be replaced with a new password with the help of the procedure in this document.

Note: 

This password recovery procedure works for these Cisco products:

·         Cisco 4700
·         Catalyst 2948G-L3
·         Cisco 827
·         Cisco AS5x00
·         Catalyst 4840G
·         Cisco uBR900
·         Cisco 6x00
·         Catalyst 4908G-L3
·         Cisco 1003
·         Cisco 7000 (RSP7000)
·         Catalyst 5500 (RSM)
·         Cisco 1004
·         Cisco 7100
·         Catalyst 8510-CSR
·         Cisco 1005
·         Cisco 7200
·         Catalyst 8510-MSR
·         Cisco 1400
·         Cisco 7500
·         Catalyst 8540-CSR
·         Cisco 1600
·         Cisco uBR7100
·         Catalyst 8540-MSR
·         Cisco 1700
·         Cisco uBR7200
·         Cisco MC3810
·         Cisco 2600
·         Cisco uBR10000
·         Cisco NI-2
·         Cisco 3600
·         Cisco 12000
·         Cisco VG200 Analog Gateway
·         Cisco 4500
·         Cisco LS1010
·         Route Processor Module
·         Cisco 1800
·         Cisco 2800
·         Cisco 3800

Prerequisites

Requirements

There are no specific requirements for this document.

Conventions

For more information on document conventions, see the Cisco Technical Tips Conventions.

Step-by-Step Procedure

To recover your password, complete these steps:
1.     Attach a terminal or PC with terminal emulation to the console port of the router.
Use these terminal settings:
o    9600 baud rate
o    No parity
o    8 data bits
o    1 stop bit
o    No flow control
For more information on cabling and details about how to connect a terminal to the console port or the AUX port, visit these links:
o    Cabling Guide for Console and AUX Ports on Cisco Routers.
o    Connect a Terminal to Catalyst 2948G-L3, 4908G-L3, and 4840G Series Switches.
o    Catalyst 8510CSR, and 8540CSR Switches Console Port Pinouts.
2.     If you still have access to the router, type show version , and record the setting of the configuration register. It is usually 0x2102 or 0x102.
For a sample output of the show version command, refer to the Example of Password Recovery Procedure section.
3.     If you do not have access to the router (because of a lost login or TACACS password), you can safely assume that your configuration register is set to 0x2102.
4.     Use the power switch to turn off the router, and then turn it back on.
Important: To simulate step 4 on a Cisco 6400, pull out and then replace the Node Route Processor (NRP) or Node Switch Processor (NSP) card.
Important: To simulate step 4 on a Cisco 6x00 using NI-2, pull out and then replace the NI-2 card.
5.     Press Break on the terminal keyboard within 60 seconds of the power-up to put the router into ROMMON.
If the break sequence does not work, see Standard Break Key Sequence Combinations During Password Recovery for other key combinations.
6.     Type confreg 0x2142 at the rommon 1> prompt to boot from Flash without loading the configuration.
7.     Type reset at the rommon 2> prompt.
The router reboots, but ignores its saved configuration.
8.     Type no after each setup question, or press Ctrl-C to skip the initial setup procedure.
9.     Type enable at the Router> prompt.
You are taken to the enable mode, and the Router# prompt appears.
10.  Important: Type configure memory or copy startup-config running-config to copy the nonvolatile RAM (NVRAM) into memory.
Do not type configure terminal .
11.  Type write terminal or show running-config .
The show running-config and write terminal commands show the configuration of the router. In this configuration you see under all the interfaces the shutdown command, which means all interfaces are currently shutdown. Also, you can see the passwords (enable password, enable secret, vty, console passwords, and so on), either in encrypted or unencrypted format. The unencrypted passwords can be re-used, the encrypted ones will have to be changed with new passwords.
12.  Type configure terminal and make the changes.
The prompt is now hostname(config)#.
For example, type enable secret <password> to change the enable secret password.
13.  Issue the no shutdown command on every interface that is used.
If you issue a show ip interface brief command, ensure that every interface that you want to use is "up up".
14.  Type config-register 0x2102, or the value you recorded in step 2.
15.  Press Ctrl-Z or end to leave the configuration mode.
The prompt is now changed to hostname#.
16.  Type write memory or copy running-config startup-config to commit the changes. 

Router Interface Configuration



 Router Interface Configuration:


To disable the sending of redirect messages if the Cisco IOS software is forced to resend a packet through the same interface on which it was received, add the following for each interface:
no ip redirects
  Disable directed broadcasts:
no ip directed-broadcast
Directed broadcasts can be misused to multiply the power of denial-of-service attacks because every denial-of-service packet sent is broadcast to every host on a subnet.
  On routers with limited memory, reduce the amount of memory used by disabling route caching:
no ip route-cache
no ip mroute-cache
  Turn off Cisco Discovery Protocol on each interface if not needed:
no cdp enable
  Disable proxy ARP on each interface:
no ip proxy-arp
  On Enterprise class routers, disable the DECnet protocols on each interface:
no mop enable
no lat enable

Access Control Lists:

  Telnet access to the router interfaces should be restricted to a subset of IP addresses:
access-list NNN allow tcp w.x.y.z 0.0.0.0 telnet log
Where NNN is an arbitrary number representing an access list.  Where w.x.y.x represents a specific IP address.  Note that other IP address subnet/subnet mask combinations can be used.
On the screening routers, create an access list (e.g.:  Access-list 111) which governs what is permitted to enter into the router from the Internet on the serial interface.  Adding "log" to the end of the access list generates a log entry when a connection matches the access list rule.  NOTE:  An attacker can use the use of any logging function against you.  Generally, management of a screening router should always be done from a trusted host on a trusted network over a more secure protocol than telnet (e.g. ssh).
Extended access lists - If you want to allow only certain IP addresses to use Telnet to access the router, you can use the access-class command.  The command “access-class xx in” defines an access list (from 1 through 99) that allows access to the virtual terminal lines on the router.  Note that logging is not possible when using an extended access list.
access-list xx permit 192.85.55.0 0.0.0.255
line vty 0 4
 access-class xx in
  The following lines in access-list 111 restrict access from non-routable and loopback addresses:
access-list 111 deny ip 127.0.0.0 0.255.255.255 any log
access-list 111 deny ip 10.0.0.0 0.255.255.255 any log
access-list 111 deny ip 172.16.0.0 0.15.255.255 any log
access-list 111 deny ip 192.168.0 0.0.255.255 any log
The following lines in access-list 112 prevent spoofing from within your company:
access-list 112 permit ip x.y.z.0 0.0.0.255 any log
Where x.y.z is a Class C addresses which is used by your company.  (Class C used as an example only.)
  Create an access list (e.g.:  Access-list 112) which governs what is permitted to enter into the Internet from on the serial interface from your company's internal network.
The following lines in access-list 112 restrict Internet access from non-routable and loopback addresses:
access-list 112 deny ip 127.0.0.0 0.255.255.255 any log
access-list 112 deny ip 10.0.0.0 0.255.255.255 any log
access-list 112 deny ip 172.16.0.0 0.15.255.255 any log
access-list 112 deny ip 192.168.0 0.0.255.255 any log
The following lines in access-list 111 prevent spoofing from the Internet:
access-list 111 deny ip x.y.z.0 0.0.0.255 any log
Where x.y.z is a Class C address used by your company.  (Class C used as an example only.)
  On router model numbers greater than 4000 and first available with IOS v11.2F, a feature called "TCP Intercept" can be used to actively prevent TCP SYN flooding denial-of-service attacks.  This feature should be enabled if your company's firewall does not provide this feature.  TCP Intercept is enabled by first defining an access list (in this example access list 111 is used):
ip tcp intercept list 111
Additional parameters can be configured to tune the TCP Intercept feature although simply enabling it should be sufficient for most applications.  Also note that this will consume CPU capacity and the load on congested routers should be watched.  Consult Cisco's documentation for more details.
  On a Cisco IOS older than 11.3, workarounds for land.c attacks should be configured.  An access list should be created which denies access from the interface to itself.  This should be applied to all interfaces:
access-list 101 deny tcp a.b.c.d 0.0.0.0 a.b.c.d 0.0.0.0 log
access-list 101 deny tcp e.f.g.h 0.0.0.0 e.f.g.h 0.0.0.0 log
Where a.b.c.d and e.f.g.h are the IP addresses of both the internal and external interfaces.
  SNMP access to the router should be reviewed by your personnel:
snmp-server y.y.y.y
Where y.y.y.y represents an SNMP server running on your network.  Community strings for both public and private must follow the corporate password policy for static passwords.
Apply an access-list to the SNMP statement in order to further restrict access to this management interface:
access-list 1 permit 1.1.1.1
access-list 1 permit 2.2.2.2
access-list 2 permit 5.5.5.5
access-list 2 permit 6.6.6.6
snmp-server community public RO 1
snmp-server community private RW 2

Note that logging is not possible when using an extended access list. 
 Restrict ICMP traffic through ACLs:
Allow PING replies to come back for PING originated from your company:
access-list 123 permit icmp any x.y.z.0.0.0.255 echo-reply
Allow TRACEROUTE replies to come back for TRACEROUTE originated from your company:
access-list 123 permit icmp any x.y.z.0.0.0.255 unreachable
access-list 123 permit icmp any x.y.z.0.0.0.255 time-exceeded
Allow router congestion messages to enter:
access-list 123 permit icmp any x.y.z.0.0.0.255 source-quench
Allow fragmentation warning messages to enter:
access-list 123 permit icmp any x.y.z.0.0.0.255 packet-too-big
Where x.y.z is a Class C address used by your company.  (Class C used as an example only.)
  A version of Cisco IOS should be used which has been modified to resist TCP fragment attacks.  Cisco IOS versions 12.0(11) and 12.1(2) have a security enhancement which allows it to partially block TCP fragment attacks.  Either of these IOS versions should be applied.
A complete defense against TCP fragment attacks is only feasible with a firewall.  This is because firewalls maintain a table of packet fragments indexed by source and destination IP address, protocol, and IP ID.  Cisco has not implemented this functionality in all routers because tracking every connection can be resource intensive.
As an example, ACL 101 would permit only non-fragmented HTTP flows to the server:
access-list 101 deny ip any host 192.168.41.3 fragments
access-list 101 permit tcp any host 192.168.41.3  eq 80
access-list 101 deny ip any any
More details pertaining to Cisco’s recommendations can be found at:
http://www.cisco.com/warp/public/105/acl_wp.html

The Banner:

  The banner message should also contain a security notice similar to the following:
banner motd ^C
This system is for the use of authorized users only.  Individuals using this computer system without authority, or in excess of their authority, are subject to having all of their activities on this system monitored and recorded by system personnel.  In the course of monitoring individuals improperly using this system, or in the course of system maintenance, the activities of authorized users may also be monitored.  Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of criminal activity, system personnel may provide the evidence of such monitoring to law enforcement officials.
Banners that identify the proprietary nature of the system and warn that any actions may be monitored are needed to allow use of logs if legal steps become necessary.  Consult your legal department for the exact wording to be used.  It is important to note that you should not provide the potential intruder with more information than required by law.  Do not list the system names, contact information, nor anything other than to warn non-authorized persons to stay out.

Administrative Interfaces:

  Put a password on the console and aux ports.  At a minimum configure:
line con 0
password YourSecretPassword
 login

line aux 0
 password YourSecretPassword
 login

Passwords should follow the corporate password policy.

  Put an idle exec session timeout to disconnect unauthenticated users after a specified period of time:
line vty 0 4
 exec-timeout Minutes

  Put an idle session timeout to disconnect authenticated users after a specified period of inactivity:
line vty 0 4
 session-timeout Minutes
  Telnet access to any router should be restricted closely by means of access-class lists:
access-list xx permit 192.168.123.123
line vty 0 4
access-class xx in

Where xx from 1 through 99 represents an ACL.
  In addition, one should consider restricting access to vtys to a protected protocol such as the SSH protocol to preclude eavesdropping and to ensure better authentication.  Cisco has implemented the server function within the Cisco IOS images 12.0(5)S for the Cisco 7200, 7500, and 12000 routers.  This implementation will allow workstations with SSH Version 1 software to form secure remote console sessions to routers with this feature.
line vty 0 4
 transport input ssh