- Check Device Attr failes "INCORRECT", same User/Password for the telnet devices are ok, verified and test user credentials via RME-file-export and tested this successfuly with putty-ssh/ttsh to some SSH devices back
- save of VLAN-Database of SSH-devices failed via "wrong SSH password" in detail message
- Netshow of all devices (telnet devices as well) will fail via "wrong SSH password" in detail message.
This means, also telnet devices, will be contacted by SSH only. This means the sensing /fallback mechanism between SSH and telnet is influenced as well. The order of Transport Protocols (SSH/telnet) in General Setup does not incluence this behaviour.
Does anybody can give me a hint, to solve this problem. Are there a SSH patch for CW2K-common services yet. Are there debugging possibilities to check out, what RME realy wants to do if it is contacting SSH devices? Are theire any SSH-debugging tools to decode the SSH-hashes within the ethereal traces to be able of seeing what is CW2K realy want to do in our existing traces?
Also Feedback with CW2K in SSH deployment would be wellcome.
Re: CW2K RME3.5 cannot authenticate to SSH-devices
Thankyou for your response. Yes this tests I did'nt try allready. But as I remember I saw SSH-Version 1.9 for all devices in the ethereal decodes. The problem now I have is the time ressources I can use for that (spare time), because other tasks at other customers. I will open this tac case as soon I have time again for this also to login to this customers network. So I will collect all the nessasary test procedures from tac to perform at once.
I'll update this record as well with hopefully solution.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...