I have the following problem with a 4500 and SSH. I am unable to connect to the switch, I have zeroed the keys and re-generated them. Here is a debug SSH from the switch is anyone able help with the problem..
17:43:35: SSH5: starting SSH control process
17:43:35: SSH5: sent protocol version id SSH-2.0-Cisco-1.25
17:43:35: SSH5: protocol version id is - SSH-2.0-SecureCRT_4.1.3 (buildT
17:43:35: SSH2 5: send: len 280 (includes padlen 4)
17:43:35: SSH2 5: SSH2_MSG_KEXINIT sent
17:43:35: SSH2 5: ssh_receive: 392 bytes received
17:43:35: SSH2 5: input: packet len 392
17:43:35: SSH2 5: partial packet 8, need 384, maclen 0
I labbed this up just to make sure. You have to enable AAA because you need to use a username and password. The VTY lines do not know you want to use a username/passwd combination and you can not login. To fix, try entering the following commands:
Router(config)# aaa new-model
Router(config)# aaa authentication login default local
Router(config)# line vty 0 4
Router(config-line)# login authentication default
The AAA new-model enables AAA. The next line tells the router that authentication group name default should use the local database for username/passwd authentication. Under the VTY lines, the login authentication default tells the VTYs to use the AAA group of default for authentication. Let us know how it goes.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...