Start a Conversation

Unsolved

This post is more than 5 years old

R

204386

May 7th, 2013 12:00

Powerconnect 6224 -Telnet and SSH configuration

I am new to programing Dell switches, have done a few older Cisco switches but never Dell switches.  For some reason I can't get a telnet or ssh logins to work.  Telnet I get a password to be asked for but nothing works and ssh just refuses connections.

Any quick references to aid me in these setups?

Thanks in advance,

Ken

5 Practitioner

 • 

274.2K Posts

May 7th, 2013 13:00

Here are some basic commands used to enable SSH

SSH – 62XX

console(config)# crypto certificate 1 generate    

console(config-crypto-cert)# key-generate ? 

        press enter to execute the command

      specifies the length of the SSL's RSA key. If unspecified, length defaults to 1024.

console(config-crypto-cert)# exit

console(config)# crypto key generate dsa

console(config)# exit

Optional

console# show crypto key mypubkey rsa

console# show crypto key mypubkey dsa

console(config)# ip ssh server   (to enable ssh)

console(config)# exit

console#

Optional

console(config)# ip ssh port XXXX  (if a port is not input ssh will use port 22)

console(config)# ip ssh pubkey-auth

To save config

console# copy running-config startup-config

Show

Console# show ip ssh

Here is also a 3rd party blog that details these steps also.

www.plaintutorials.com/enable-ssh-server-on-dell-powerconnect-switch

Cheers

15 Posts

May 8th, 2013 14:00

Thanks for the information.  I did all of this already and it does match what I have seen in other forums.  I think my issue is a firmware issue.  I have found that I dont get the username all of the time when TELNETTing in.  Sometimes it works and most times it wont.  Thanks for the information.

Ken

April 25th, 2016 10:00

This commands are working for TELNET, SSH and VPN:

TELNET www.youtube.com/watch

Router(config)# hostname R1

Line vty 0 4

Password »cisco«

Login

“Ni dovoljenja no pasword set=”

line vty 0 4

privilege level 15

ali

conf t

line vty 0 4

no privilege level 15

end

AND SSH IF YOU NEED :

SSH (ssh –l )

Ip domain-name »vegova.si«

crypto key generate rsa

1024

R1(config)#ip ssh ver

R1(config)#ip ssh version 2

R1(config)#line vty 0 4

R1(config-line)#transport input all

SWITCH

(make vlan)=

Hostname »S1«

Switch(config)#int vlan 1

Switch(config-if)#ip address 192.168.1.4 255.255.255.0

S1(config-if)#no shutdown

and VPN if you want:

VPN

www.youtube.com/watch

1. Nastavitev parametrov varne zveze IKE

Router(config)#crypto isakmp policy 1 definiranje politike IKE

Router(config-isakmp)#hash md5 izbira zgoščevalnega algoritma

Router (config-isakmp)#encryption des izbira enkripcijskega algoritma

Router(config-isakmp)#authentication pre- share določitev avtentikacijskega postopka

Router(config-isakmp)#lifetime 86400 čas trajanja zveze v sekundah

Router(config-isakmp)#group 2 izbira skupine Diffie-Hellman

Router(config)#crypto isakmp key 0 KLJUC

address 172.16.1.10 določitev ključa za avtentikacijo, ki ga povežemo s končno točko tunela (IP naslov varnostnega prehoda 2)

2. Nastavitev parametrov tunelske povezave IPSec

Router(config)#crypto ipsec transform-set

TUNEL esp-des esp-md5-hmac izbira protokolov in algoritmov tunelske povezave IPSec

Router(cfg-crypto-trans)#mode tunnel določitev tunelskega načina varne zveze – ni

3. Nastavit ev šifrirnega načrta

Končna točka je zadnji pc

Router(config)#crypto map NACRT 1 ipsec- isakmp šifrirni načrt določimo z imenom, številko in načinom vzpostavljanja tunelske povezave

Router(config-crypto-map)#set peer

172.16.1.10 določitev končne točke tunelske povezave

Router(config-crypto-map)#set transform-set

TUNEL izbira predhodno definiranega nabora protokolov in algoritmov

Router(config-crypto-map)#match address 100 izbira dostopovnega seznama oz. prometa, ki se naj kriptira

4. Določitev dostopovnega seznama oz. prometa, ki naj se šifrir a

Router(config)#access-list 100 permit ip

192.168.10.0 0.0.0.255 192.168.20.0 0.0.0.255

določitev prometa, ki naj se kriptira (naš primer: promet, ki gre iz omrežja 192.168.10.0 v omrežje 192.168.20.0)

5. Določitev vmesnika, kjer se izvaja enkripcija prometa

Router(config)#interface FastEthernet 0/1 izberemo vmesnik na katerem se bo izvajala enkripcija

Router(config-if)#crypto map NACRT izvaja naj se šifrirni načrt, ki je določen s

politiko ˝NACRT˝

No Events found!

Top