Unsolved
This post is more than 5 years old
15 Posts
0
204386
Powerconnect 6224 -Telnet and SSH configuration
I am new to programing Dell switches, have done a few older Cisco switches but never Dell switches. For some reason I can't get a telnet or ssh logins to work. Telnet I get a password to be asked for but nothing works and ssh just refuses connections.
Any quick references to aid me in these setups?
Thanks in advance,
Ken
Anonymous
5 Practitioner
5 Practitioner
•
274.2K Posts
0
May 7th, 2013 13:00
Here are some basic commands used to enable SSH
SSH – 62XX
console(config)# crypto certificate 1 generate
console(config-crypto-cert)# key-generate ?
press enter to execute the command
specifies the length of the SSL's RSA key. If unspecified, length defaults to 1024.
console(config-crypto-cert)# exit
console(config)# crypto key generate dsa
console(config)# exit
Optional
console# show crypto key mypubkey rsa
console# show crypto key mypubkey dsa
console(config)# ip ssh server (to enable ssh)
console(config)# exit
console#
Optional
console(config)# ip ssh port XXXX (if a port is not input ssh will use port 22)
console(config)# ip ssh pubkey-auth
To save config
console# copy running-config startup-config
Show
Console# show ip ssh
Here is also a 3rd party blog that details these steps also.
www.plaintutorials.com/enable-ssh-server-on-dell-powerconnect-switch
Cheers
rodeoboy
15 Posts
1
May 8th, 2013 14:00
Thanks for the information. I did all of this already and it does match what I have seen in other forums. I think my issue is a firmware issue. I have found that I dont get the username all of the time when TELNETTing in. Sometimes it works and most times it wont. Thanks for the information.
Ken
network12345678
1 Message
0
April 25th, 2016 10:00
This commands are working for TELNET, SSH and VPN:
TELNET www.youtube.com/watch
Router(config)# hostname R1
Line vty 0 4
Password »cisco«
Login
“Ni dovoljenja no pasword set=”
line vty 0 4
privilege level 15
ali
conf t
line vty 0 4
no privilege level 15
end
AND SSH IF YOU NEED :
SSH (ssh –l )
Ip domain-name »vegova.si«
crypto key generate rsa
1024
R1(config)#ip ssh ver
R1(config)#ip ssh version 2
R1(config)#line vty 0 4
R1(config-line)#transport input all
SWITCH
(make vlan)=
Hostname »S1«
Switch(config)#int vlan 1
Switch(config-if)#ip address 192.168.1.4 255.255.255.0
S1(config-if)#no shutdown
and VPN if you want:
VPN
www.youtube.com/watch
1. Nastavitev parametrov varne zveze IKE
Router(config)#crypto isakmp policy 1 definiranje politike IKE
Router(config-isakmp)#hash md5 izbira zgoščevalnega algoritma
Router (config-isakmp)#encryption des izbira enkripcijskega algoritma
Router(config-isakmp)#authentication pre- share določitev avtentikacijskega postopka
Router(config-isakmp)#lifetime 86400 čas trajanja zveze v sekundah
Router(config-isakmp)#group 2 izbira skupine Diffie-Hellman
Router(config)#crypto isakmp key 0 KLJUC
address 172.16.1.10 določitev ključa za avtentikacijo, ki ga povežemo s končno točko tunela (IP naslov varnostnega prehoda 2)
2. Nastavitev parametrov tunelske povezave IPSec
Router(config)#crypto ipsec transform-set
TUNEL esp-des esp-md5-hmac izbira protokolov in algoritmov tunelske povezave IPSec
Router(cfg-crypto-trans)#mode tunnel določitev tunelskega načina varne zveze – ni
3. Nastavit ev šifrirnega načrta
Končna točka je zadnji pc
Router(config)#crypto map NACRT 1 ipsec- isakmp šifrirni načrt določimo z imenom, številko in načinom vzpostavljanja tunelske povezave
Router(config-crypto-map)#set peer
172.16.1.10 določitev končne točke tunelske povezave
Router(config-crypto-map)#set transform-set
TUNEL izbira predhodno definiranega nabora protokolov in algoritmov
Router(config-crypto-map)#match address 100 izbira dostopovnega seznama oz. prometa, ki se naj kriptira
4. Določitev dostopovnega seznama oz. prometa, ki naj se šifrir a
Router(config)#access-list 100 permit ip
192.168.10.0 0.0.0.255 192.168.20.0 0.0.0.255
določitev prometa, ki naj se kriptira (naš primer: promet, ki gre iz omrežja 192.168.10.0 v omrežje 192.168.20.0)
5. Določitev vmesnika, kjer se izvaja enkripcija prometa
Router(config)#interface FastEthernet 0/1 izberemo vmesnik na katerem se bo izvajala enkripcija
Router(config-if)#crypto map NACRT izvaja naj se šifrirni načrt, ki je določen s
politiko ˝NACRT˝