i have a 3850 switch up and running in our office. from past week i am not able to do ssh to my switch. below is the configuration attached, it was working pretty much good and i haven't done any changes in the configuration.
line con 0 password 7 xxxxxxxxxxxxxxx login local stopbits 1 line aux 0 stopbits 1 line vty 0 4 password 7 xxxxxxxxxxxxxx login local transport input ssh line vty 5 15 password 7 xxxxxxxxxxxxx login local transport input ssh
you have to use crypto keys to setup ssh its not optional feature it wont work without them , that's why you have a k9 image to support ssh/crypto-- you have them set Minimum expected Diffie Hellman key size : 1024 bits
change the ssh to be fully v2 -- ip ssh version 2 ots using an unsecure ssh version 1.99 whihci is v1 and v2 you don't want v1 active its insecure
Then regenerate the keys--- crypto key generate rsa (hit return type 1024 for sshv2 keys) , then debug ip ssh and try and access the router , make sure the putty/terminal is set to use sshv2
You should see something like in your logs---
Aug 3 09:47:12.779 UTC: SW1: SSH2 1: authentication successful for mmalone
Then debug ip ssh and try again , everything looks ok from your output so your keys are either corrupted or your using a terminal thats set to v2 only or something else
There are four steps required to enable SSH support on a Cisco IOS router:
Configure the hostname command.
Configure the DNS domain.
Generate the SSH key to be used.
Enable SSH transport support for the virtual type terminal (vtys).
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...