Secure Shell (SSH) FAQ



Similar documents
Configuring Secure Shell on Routers and Switches Running Cisco IOS

Cisco Configuring Secure Shell (SSH) on Cisco IOS Router

Configuring CSS Remote Access Methods

Lab 2.5.2a Configure SSH

Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Lab 8.3.3b Configuring a Remote Router Using SSH

Configuring TACACS+, RADIUS, and Kerberos on Cisco Catalyst Switches

Web Authentication Proxy on a Wireless LAN Controller Configuration Example

Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5

Encrypted Preshared Key

Configuring a Gateway of Last Resort Using IP Commands

FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SFTP (Secure File Transfer Protocol)

Lab Configure Basic AP Security through IOS CLI

Controlling Access to a Virtual Terminal Line

Implementing Secure Shell

Encrypted Preshared Key

2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer

BRI to PRI Connection Using Data Over Voice

Enhanced Password Security - Phase I

Configuring DNS on Cisco Routers

- Basic Router Security -

Configuring SSH and Telnet

RADIUS Server Load Balancing

Network Management Card Security Implementation

Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,

Basic Router Configuration Using Cisco Configuration Professional

Flow-Based per Port-Channel Load Balancing

DHCP Server Port-Based Address Allocation

Syslog Server Configuration on Wireless LAN Controllers (WLCs)

Password Recovery Procedure for the Cisco 3600 and 3800 Series Routers

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0

The Purpose and Use of the Configuration Register on All Cisco Routers

Troubleshooting the Firewall Services Module

Contents. Part 1 SSH Basics 1. Acknowledgments About the Author Introduction

Lab Configure IOS Firewall IDS

Configuring Static and Dynamic NAT Simultaneously

Unity Error Message: Your voic box is almost full

Password Recovery Procedure for the Cisco 806, 826, 827, 828, 831, 836, 837 and 881 Series Routers

ASA 8.x: Renew and Install the SSL Certificate with ASDM

FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SSL/FTP (File Transfer Protocol over Secure Sockets Layer)

MFC7840W Windows Network Connection Repair Instructions

8 steps to protect your Cisco router

Enabling Remote Access to the ACE

Password Recovery Procedure for the Cisco Catalyst 2948G L3, 4840G, and 4908G L3 Switch Routers

CCT vs. CCENT Skill Set Comparison

Enhanced Password Security - Phase I

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

CTIOS Agent Softphone Login Failure

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

CCNA Security. Chapter Two Securing Network Devices Cisco Learning Institute.

Configuring SIP Support for SRTP

RADIUS Server Load Balancing

Configure Backup Server for Cisco Unified Communications Manager

Module 6 Configure Remote Access VPN

How To Configure InterVLAN Routing on Layer 3 Switches

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example

crypto key generate rsa

SNMP Version 3. Finding Feature Information. Information About SNMP Version 3. Security Features in SNMP Version 3

Image Verification. Finding Feature Information. Restrictions for Image Verification

Using Two-Factor Authentication Configuration to Combat Cybersecurity Threats

Security Policy Revision Date: 23 April 2009

PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example

Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)

CISCO IOS NETWORK SECURITY (IINS)

Configuring IKEv2 Load Balancer

Configuring the Content Routing Software

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

CCNA Security 1.1 Instructional Resource

PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example

Compliance and Industry Regulations

Transport Level Security

Network Simulator Lab Study Plan

Configuring Password Encryption

- The PIX OS Command-Line Interface -

Xmodem Console Download Procedure Using ROMmon

Lab Creating a Logical Network Diagram

TotalCloud Phone System

Using Cisco IOS Software

Configuring Cisco CallManager IP Phones to Work With IP Phone Agent

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Agent Unable to Log Into Cisco Agent Desktop

Table of Contents. Configuring IP Access Lists

Configuring the Device for Access Point Discovery

CCNA Security. Chapter Three Authentication, Authorization, and Accounting Cisco Learning Institute.

LifeSize Video Communications Systems Administrator Guide

Troubleshooting the Firewall Services Module

CTS2134 Introduction to Networking. Module Network Security

Lab Organizing CCENT Objectives by OSI Layer

ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example

athenahealth Interface Connectivity SSH Implementation Guide

Configuring Secure Socket Layer HTTP

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

CONNECTING THE RASPBERRY PI TO A NETWORK

Configuring the Firewall Management Interface

- Advanced IOS Functions -

ICND IOS CLI Study Guide (CCENT)

Whitepaper : Using Unsniff Network Analyzer to analyze SSL / TLS

Transcription:

Secure Shell (SSH) FAQ Document ID: 19143 Contents Introduction How do I configure SSH terminal line access (also known as reverse telnet)? Is SSH supported on the Catalyst 2900? How can I determine which platforms and versions of code support SSH? When I try to remove certain SSH commands from my router, it continues to ask me to create RSA keys in order to enable SSH. Why is this? Does Cisco IOS SSH version 2 support Digital Signature Standard (DSS)? Does the Cisco IOS SSH server support agent forwarding? What client authentication mechanisms are supported on the Cisco IOS SSH server? What does the error Local: Corrupted check bytes on input mean? Does Cisco IOS support SSH with Blowfish cipher? When I try to generate RSA keys for SSH access on a router using the crypto key generate rsa command in config mode, I receive this error: % Invalid input detected at '^' marker.. It does not let the router generate the RSA keys to enable SSH access for the router. How is this error resolved? Do Crypto images support Strong cipher to use SSH with ciphers such as 3DES or AES? These messages are seen in the logs when trying to configure SSH on a router: SSH2 13: RSA_sign: private key not found and SSH2 13: signature creation failed, status 1. How is this resolved? Related Information Introduction This document answers the most Frequently Asked Questions (FAQs) related to Secure Shell (SSH). Q. How do I configure SSH terminal line access (also known as reverse telnet)? A. This was first introduced in some platforms of Cisco IOS Software Release 12.2.2.T.

Router(config)#line line number [ending line number] Router(config line)# Router(config line)#login {local authentication listname Router(config line)#rotary group Router(config line)#transport input {all ssh} Router(config line)#exit Router(config)#ip ssh port portnum rotary group! Line 1 SSH Port Number 2001 line 1 rotary 1! Line 2 SSH Port Number 2002 line 2 rotary 2! Line 3 SSH Port Number 2003 line 3 rotary 3 ip ssh port 2001 rotary 1 3 Command Reference:

ip ssh port ip ssh port portnum rotary group no ip ssh port portnum rotary group portnum Specifies the port to which SSH needs to connect, such as 2001. rotary group Specifies the defined rotary that needs to search for a valid name. Q. Is SSH supported on the Catalyst 2900? A. No, it is not. Q. How can I determine which platforms and versions of code support SSH? A. See the Feature Navigator ( registered customers only) and specify the SSH feature. Q. When I try to remove certain SSH commands from my router, it continues to ask me to create RSA keys in order to enable SSH. Why is this? A. An example of this problem is show here: 804#configure terminal Enter configuration commands, one per line. End with CNTL/Z. 804(config)#no ip ssh time out 120 Please create RSA keys to enable SSH. 804(config)#no ip ssh authen Please create RSA keys to enable SSH. 804(config) You are encountering Cisco bug ID CSCdv70159 ( registered customers only). Q. Does Cisco IOS SSH version 2 support Digital Signature Standard (DSS)? A. Cisco IOS SSH version 2 (derived from OpenSSH code) does not support DSS. Q. Does the Cisco IOS SSH server support agent forwarding? A. Cisco IOS SSH does not support agent forwarding. Cisco IOS SSH is derived from OpenSSH code. It interoperates with all the commercial SSH implementations. Q. What client authentication mechanisms are supported on the Cisco IOS SSH server? A. Cisco IOS SSH version 2 (SSHv2) supports keyboard interactive and password based authentication methods. In addition to these authentication methods, the SSHv2 Enhancements for RSA Keys feature (available starting with Cisco IOS Software Release 15.0(1)M) supports RSA based public key authentication for the client and server. For additional information on the authentication mechanisms supported by the Cisco IOS SSH server, refer to Secure Shell Version 2 Support.

Q. What does the error Local: Corrupted check bytes on input mean? A. Corrupted checkbytes means the SSH packet received failed its integrity check. This is usually because of incorrect decryption. This is also because of an incorrect key used. The incorrect key is caused by the dropping of an encrypted SSH packet. You have either dropped an encrypted packet which should have been sent or dropped a received encrypted packet which should have been decrypted. Q. Does Cisco IOS support SSH with Blowfish cipher? A. Cisco IOS does not support SSH with Blowfish cipher. When an SSH client sends such unsupported cipher, the router displays debug messages mentioned in SSH Client Sends Unsupported (Blowfish) Cipher. Q. When I try to generate RSA keys for SSH access on a router using the crypto key generate rsa command in config mode, I receive this error: % Invalid input detected at '^' marker.. It does not let the router generate the RSA keys to enable SSH access for the router. How is this error resolved? A. This error appears when the image used on the router does not support the crypto key generate rsa command. This command is supported only in security images. In order to resolve this error use the security image of the appropriate series of the Cisco IOS router used. Q. Do Crypto images support Strong cipher to use SSH with ciphers such as 3DES or AES? A. Yes. Only Crypto images support Strong cipher. In order to use SSH with ciphers such as 3DES or AES you must have Crypto images on your Cisco device. Q. These messages are seen in the logs when trying to configure SSH on a router: SSH2 13: RSA_sign: private key not found and SSH2 13: signature creation failed, status 1. How is this resolved? A. These log messages are seen due to Cisco bug IDs CSCsa83601 ( registered customers only) and CSCtc41114 ( registered customers only). Refer to these bugs for more information. Related Information SSH Support Page Technical Support & Documentation Cisco Systems Contacts & Feedback Help Site Map 2014 2015 Cisco Systems, Inc. All rights reserved. Terms & Conditions Privacy Statement Cookie Policy Trademarks of Cisco Systems, Inc.

Updated: Feb 02, 2006 Document ID: 19143