×

Warning message

  • Cisco Support Forums is in Read Only mode while the site is being migrated.
  • Cisco Support Forums is in Read Only mode while the site is being migrated.

ssh username incorrect

Answered Question
May 20th, 2014
User Badges:
 

Not sure if it is the packet tracer, but when attempting a packet tracer(1.3.1.3 Packet Tracer - Skills Integration Challenge) for my class the ssh username is saying incorrect this is what am typing: ip domain-name cisco.com crypto key generate rsa 1024 username HQadmin Secret ciscoclass and that is where I think the trouble is at. these are the directions:

· Configure remote management access including IP addressing and SSH: - Domain is cisco.com - User HQadmin with password ciscoclass - Crypto key length of 1024 - SSH version 2, limited to 2 authentication attempts and a 60 second timeout - Clear text passwords should be encrypted. here is the commands entering: ! line vty 0 4 password 7 0822455D0A16 login local transport input ssh line vty 5 15 password 7 0822455D0A16 login local transport input ssh ! ! end

Cnt-Sw(config)#do show ru Cnt-Sw(config)#do show running-config Building configuration...

Current configuration : 2910 bytes ! version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec service password-encryption ! hostname Cnt-Sw ! ! ! ip ssh version 2 ip ssh authentication-retries 2 ip ssh time-out 60 ip domain-name cisco.com ! username HQadmin secret 5 $1$mERr$UBS6AqpcFjkupAnmSUCGG. ! spanning-tree mode pvst ! interface FastEthernet0/1 switchport access vlan 30 switchport mode access switchport port-security switchport port-security maximum 2 switchport port-security mac-address sticky switchport port-security violation restrict ! interface FastEthernet0/2 switchport access vlan 30 switchport mode access ! interface FastEthernet0/3 switchport access vlan 30 switchport mode access ! interface FastEthernet0/4 switchport access vlan 30 switchport mode access ! interface FastEthernet0/5 switchport access vlan 30 switchport mode access ! interface FastEthernet0/6 switchport access vlan 30 switchport mode access ! interface FastEthernet0/7 switchport access vlan 30 switchport mode access ! interface FastEthernet0/8 switchport access vlan 30 switchport mode access ! interface FastEthernet0/9 switchport access vlan 30 switchport mode access ! interface FastEthernet0/10 switchport access vlan 30 switchport mode access ! interface FastEthernet0/11 switchport access vlan 15 switchport mode access ! interface FastEthernet0/12 switchport access vlan 15 switchport mode access ! interface FastEthernet0/13 switchport access vlan 15 switchport mode access ! interface FastEthernet0/14 switchport access vlan 15 switchport mode access ! interface FastEthernet0/15 switchport access vlan 15 switchport mode access ! interface FastEthernet0/16 switchport access vlan 15 switchport mode access ! interface FastEthernet0/17 switchport access vlan 15 switchport mode access ! interface FastEthernet0/18 switchport access vlan 15 switchport mode access ! interface FastEthernet0/19 switchport access vlan 15 switchport mode access ! interface FastEthernet0/20 switchport access vlan 15 switchport mode access ! interface FastEthernet0/21 switchport mode access switchport port-security switchport port-security maximum 2 switchport port-security mac-address sticky switchport port-security violation restrict shutdown ! interface FastEthernet0/22 ! interface FastEthernet0/23 ! interface FastEthernet0/24 ! interface GigabitEthernet1/1 switchport access vlan 45 switchport trunk native vlan 45 switchport trunk allowed vlan 15,30,45 switchport mode trunk ! interface GigabitEthernet1/2 shutdown ! interface Vlan1 no ip address shutdown ! interface Vlan60 ip address 172.16.15.10 255.255.255.248 ! ip default-gateway 172.16.15.9 ! ! line con 0 password 7 0822455D0A16 login ! line vty 0 4 password 7 0822455D0A16 login local transport input ssh line vty 5 15 password 7 0822455D0A16 login local transport input ssh ! ! end

Cnt-Sw(config)#ip dom Cnt-Sw(config)#ip dom Cnt-Sw(config)#ip doma Cnt-Sw(config)#ip domai Cnt-Sw(config)#ip domain Cnt-Sw(config)#ip domain= Cnt-Sw(config)#ip domain- Cnt-Sw(config)#ip domain-n Cnt-Sw(config)#ip domain-name cisco.com Cnt-Sw(config)#cypr Cnt-Sw(config)#cr Cnt-Sw(config)#crypto k Cnt-Sw(config)#crypto key g Cnt-Sw(config)#crypto key generate r Cnt-Sw(config)#crypto key generate rsa % You already have RSA keys defined named Cnt-Sw.cisco.com . % Do you really want to replace them? [yes/no]: y The name for the keys will be: Cnt-Sw.cisco.com Choose the size of the key modulus in the range of 360 to 2048 for your General Purpose Keys. Choosing a key modulus greater than 512 may take a few minutes.

How many bits in the modulus [512]: 1024 % Generating 1024 bit RSA keys, keys will be non-exportable...[OK]

Cnt-Sw(config)#username HQadmin secret ciscoclass *Mar 1 10:25:38.914: %SSH-5-ENABLED: SSH 2 has been enabled Cnt-Sw(config)#do show running-config Building configuration...

Current configuration : 2910 bytes ! version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec service password-encryption ! hostname Cnt-Sw ! ! ! ip ssh version 2 ip ssh authentication-retries 2 ip ssh time-out 60 ip domain-name cisco.com ! username HQadmin secret 5 $1$mERr$UBS6AqpcFjkupAnmSUCGG. ! spanning-tree mode pvst ! interface FastEthernet0/1 switchport access vlan 30 switchport mode access switchport port-security switchport port-security maximum 2 switchport port-security mac-address sticky switchport port-security violation restrict ! interface FastEthernet0/2 switchport access vlan 30 switchport mode access ! interface FastEthernet0/3 switchport access vlan 30 switchport mode access ! interface FastEthernet0/4 switchport access vlan 30 switchport mode access ! interface FastEthernet0/5 switchport access vlan 30 switchport mode access ! interface FastEthernet0/6 switchport access vlan 30 switchport mode access ! interface FastEthernet0/7 switchport access vlan 30 switchport mode access ! interface FastEthernet0/8 switchport access vlan 30 switchport mode access ! interface FastEthernet0/9 switchport access vlan 30 switchport mode access ! interface FastEthernet0/10 switchport access vlan 30 switchport mode access ! interface FastEthernet0/11 switchport access vlan 15 switchport mode access ! interface FastEthernet0/12 switchport access vlan 15 switchport mode access ! interface FastEthernet0/13 switchport access vlan 15 switchport mode access ! interface FastEthernet0/14 switchport access vlan 15 switchport mode access ! interface FastEthernet0/15 switchport access vlan 15 switchport mode access ! interface FastEthernet0/16 switchport access vlan 15 switchport mode access ! interface FastEthernet0/17 switchport access vlan 15 switchport mode access ! interface FastEthernet0/18 switchport access vlan 15 switchport mode access ! interface FastEthernet0/19 switchport access vlan 15 switchport mode access ! interface FastEthernet0/20 switchport access vlan 15 switchport mode access ! interface FastEthernet0/21 switchport mode access switchport port-security switchport port-security maximum 2 switchport port-security mac-address sticky switchport port-security violation restrict shutdown ! interface FastEthernet0/22 ! interface FastEthernet0/23 ! interface FastEthernet0/24 ! interface GigabitEthernet1/1 switchport access vlan 45 switchport trunk native vlan 45 switchport trunk allowed vlan 15,30,45 switchport mode trunk ! interface GigabitEthernet1/2 shutdown ! interface Vlan1 no ip address shutdown ! interface Vlan60 ip address 172.16.15.10 255.255.255.248 ! ip default-gateway 172.16.15.9 ! ! line con 0 password 7 0822455D0A16 login ! line vty 0 4 password 7 0822455D0A16 login local transport input ssh line vty 5 15 password 7 0822455D0A16 login local transport input ssh ! ! end

Cnt-Sw(config)#

Correct Answer by SANTHOSHKUMAR S... about 3 years 3 months ago

Hi .

 Looks like already same username is created with different password

no username HQadmin 

username HQadmin secret ciscoclass  

Not sure this sentence talks about MD5 encryption

Clear text passwords should be encrypted 

if it not accpeting try with plain password

username HQadmin password ciscoclass  

HTH

Sandy

 

 

 

 

 

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 5 (1 ratings)
Loading.
SANTHOSHKUMAR S... Tue, 05/20/2014 - 17:34
User Badges:
  • Silver, 250 points or more

Hi,

 If i understand your issue correctly , you are not prompted with username during SSH remote login ?? or the issue is some other .

 

HTH

Sandy

mikemailnit2013 Tue, 05/20/2014 - 17:43
User Badges:

sorry if not clear on this but what am trying to do is setup ssh on a router for the first time by going into the cisco ios and entering into global configuration mode etc...(I am a student and we use a live environment program call packet tracer) the packet tracer is scored on points and one of the points is saying that the username is incorrect..to much to repeat(please see above for the reset of explanation)

Correct Answer
SANTHOSHKUMAR S... Tue, 05/20/2014 - 18:18
User Badges:
  • Silver, 250 points or more

Hi .

 Looks like already same username is created with different password

no username HQadmin 

username HQadmin secret ciscoclass  

Not sure this sentence talks about MD5 encryption

Clear text passwords should be encrypted 

if it not accpeting try with plain password

username HQadmin password ciscoclass  

HTH

Sandy

 

 

 

 

 

mikemailnit2013 Tue, 05/20/2014 - 18:32
User Badges:

hum interesting think I did try that, but let me try that again encase have not.

mikemailnit2013 Tue, 05/20/2014 - 18:39
User Badges:

nope did not work and sorry hit correct answer by mistake.

this is the output and here is an attachment:

Central(config)#username HQadmin pass ciscoclass
ERROR: Can not have both a user password and a user secret.
Please choose one or the other.
Central(config)#no username HQadmin secret ciscoclass
Central(config)#username HQadmin password ciscoclass

Attachment: 
SANTHOSHKUMAR S... Tue, 05/20/2014 - 21:16
User Badges:
  • Silver, 250 points or more

Hi ,

 ERROR: Can not have both a user password and a user secret.
Please choose one or the other.

Only one at a time can be configured for same username , either secret or normal password . 

Try only 

no username HQadmin Secret ciscoclass

no username HQadmin Password ciscoclass

username HQadmin Secret ciscoclass

For an individual user, we can have either a plain text password OR a secret associated with that user, but both may not be configured for a given user.

 

HTH

Sandy

 

Actions

This Discussion

Related Content