cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
499
Views
3
Helpful
3
Replies

unable to ssh into 'Catalyst 9000 Always-On Sandbox'

vsirakov
Level 1
Level 1

As of this morning, ssh-ing into this sandbox keeps timing out. Here are some logs in case they are helpful.

```
ssh -vvv user@devnetsandboxiosxec9k.cisco.com
OpenSSH_9.9p2, LibreSSL 3.3.6
debug1: Reading configuration data /Users/redacted/.ssh/config
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 21: include /etc/ssh/ssh_config.d/* matched no files
debug1: /etc/ssh/ssh_config line 54: Applying options for *
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> '/Users/redacted/.ssh/known_hosts'
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> '/Users/redacted/.ssh/known_hosts2'
debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling
debug3: channel_clear_timeouts: clearing
debug1: Connecting to devnetsandboxiosxec9k.cisco.com port 22.
ssh: connect to host devnetsandboxiosxec9k.cisco.com port 22: Operation timed out
```

1 Accepted Solution

Accepted Solutions

@vsirakov looks ok now 

❯ nc -zv devnetsandboxiosxec9k.cisco.com 22
Connection to devnetsandboxiosxec9k.cisco.com port 22 [tcp/ssh] succeeded!
Please mark this as helpful or solution accepted to help others
Connect with me https://bigevilbeard.github.io

View solution in original post

3 Replies 3

I am going to take a guess and say, with this being the AO sandbox, someone has removed port 22

~ via  v20.19.0 via 🐍 v3.9.6
❯ nc -zv devnetsandboxiosxec9k.cisco.com 22
^C

~ via  v20.19.0 via 🐍 v3.9.6 took 12s
❯ nc -zv devnetsandboxiosxec9k.cisco.com 443
Connection to devnetsandboxiosxec9k.cisco.com port 443 [tcp/https] succeeded!

 The team will need to advise.

Please mark this as helpful or solution accepted to help others
Connect with me https://bigevilbeard.github.io

Jesus Illescas
Cisco Employee
Cisco Employee

I reviewed the device using RESTCONF (thanks @bigevilbeard for checking is working) the config looks fine, although I don't deal with XE that much, so not sure if a vrf command is missing. I'll ping the team still. 

❯ curl -X GET \
  -H "Accept: application/yang-data+json" \
  -H "Content-Type: application/yang-data+json" \
  -u xxxxxx:yyyyyy \
  --insecure \
  "https://devnetsandboxiosxec9k.cisco.com/restconf/data/Cisco-IOS-XE-native:native"

{
  "Cisco-IOS-XE-native:native": {
    "version": "17.15",
    "memory": {
      "free": {
        "low-watermark": {
          "processor": 74467
        }
      }
    },
    "service": {
      "internal": [null],
      "password-encryption": [null],
      "timestamps": {
        "debug-config": {
          "datetime": {
            "msec": [null]
          }
        },
        "log-config": {
          "datetime": {
            "msec": [null]
          }
        }
      }
    },
    "hostname": "CAT9k_AO",
    "enable": {
      "password": {
        "type": "7",
        "secret": "0528571C22431F5B4A5142"
      }
    },
    "archive": {
      "log": {
        "config": {
          "hidekeys": [null]
        }
      }
    },
    "username": [
      {
        "name": "admin",
        "privilege": 15,
        "password": {
          "encryption": "7",
          "password": "013057175804575D72181B"
        }
      }
    ],
    "vrf": {
      "definition": [
        {
          "name": "Mgmt-vrf",
          "address-family": {
            "ipv4": {
            },
            "ipv6": {
            }
          }
        }
      ]
    },
    "ip": {
      "domain": {
        "lookup": false,
        "name-container": {
          "name-no-vrf": "lab.devnetsandbox.local"
        },
        "name": "lab.devnetsandbox.local"
      },
      "default-gateway": "10.10.20.254",
      "forward-protocol-v2": {
        "nd": true
      },
      "forward-protocol": {
        "protocol": "nd"
      },
      "route": {
        "vrf": [
          {
            "name": "Mgmt-vrf",
            "ip-route-interface-forwarding-list": [
              {
                "prefix": "0.0.0.0",
                "mask": "0.0.0.0",
                "fwd-list": [
                  {
                    "fwd": "10.10.20.254"
                  }
                ]
              }
            ]
          }
        ]
      },
      "ssh": {
        "version": 2,
        "bulk-mode": {
          "window-size": 131072
        }
      },
      "tcp": {
        "mss": 1280,
        "window-size": 212000,
        "ack-tuning": {
        }
      },
      "Cisco-IOS-XE-http:http": {
        "server": true,
        "secure-server": true
      }
    },
    "vlan": {
      "Cisco-IOS-XE-vlan:vlan-list": [
        {
          "id": 10
        }
      ]
    },
    "policy": {
      "Cisco-IOS-XE-policy:class-map": [
        {
          "name": "non-client-nrt-class",
          "prematch": "match-any"
        },
        {
          "name": "system-cpp-default",
          "prematch": "match-any",
          "description": "EWLC control, EWLC data, Inter FED"
        },
        {
          "name": "system-cpp-police-data",
          "prematch": "match-any",
          "description": "ICMP redirect, ICMP_GEN and BROADCAST"
        },
        {
          "name": "system-cpp-police-dhcp-snooping",
          "prematch": "match-any",
          "description": "DHCP snooping"
        },
        {
          "name": "system-cpp-police-dot1x-auth",
          "prematch": "match-any",
          "description": "DOT1X Auth"
        },
        {
          "name": "system-cpp-police-forus",
          "prematch": "match-any",
          "description": "Forus Address resolution and Forus traffic"
        },
        {
          "name": "system-cpp-police-l2-control",
          "prematch": "match-any",
          "description": "L2 control"
        },
        {
          "name": "system-cpp-police-l2lvx-control",
          "prematch": "match-any",
          "description": "L2 LVX control packets"
        },
        {
          "name": "system-cpp-police-multicast",
          "prematch": "match-any",
          "description": "Transit Traffic and MCAST Data"
        },
        {
          "name": "system-cpp-police-multicast-end-station",
          "prematch": "match-any",
          "description": "MCAST END STATION"
        },
        {
          "name": "system-cpp-police-protocol-snooping",
          "prematch": "match-any",
          "description": "Protocol snooping"
        },
        {
          "name": "system-cpp-police-punt-webauth",
          "prematch": "match-any",
          "description": "Punt Webauth"
        },
        {
          "name": "system-cpp-police-routing-control",
          "prematch": "match-any",
          "description": "Routing control and Low Latency"
        },
        {
          "name": "system-cpp-police-stackwise-virt-control",
          "prematch": "match-any",
          "description": "Stackwise Virtual"
        },
        {
          "name": "system-cpp-police-sw-forward",
          "prematch": "match-any",
          "description": "Sw forwarding, L2 LVX data, LOGGING"
        },
        {
          "name": "system-cpp-police-sys-data",
          "prematch": "match-any",
          "description": "Learning cache ovfl, High Rate App, Exception, EGR Exception, NFL SAMPLED DATA, RPF Failed"
        },
        {
          "name": "system-cpp-police-system-critical",
          "prematch": "match-any",
          "description": "System Critical and Gold Pkt"
        },
        {
          "name": "system-cpp-police-topology-control",
          "prematch": "match-any",
          "description": "Topology control"
        }
      ],
      "Cisco-IOS-XE-policy:policy-map": [
        {
          "name": "system-cpp-policy"
        }
      ]
    },
    "interface": {
      "GigabitEthernet": [
        {
          "name": "0/0",
          "description": "DO NOT TOUCH",
          "vrf": {
            "forwarding": "Mgmt-vrf"
          },
          "ip": {
            "address": {
              "primary": {
                "address": "10.10.20.66",
                "mask": "255.255.255.0"
              }
            }
          },
          "Cisco-IOS-XE-ethernet:port-settings": {
            "auto-negotiation": "enable"
          },
          "Cisco-IOS-XE-ethernet:negotiation": {
            "auto": true
          }
        },
        {
          "name": "1/0/1",
          "switchport-config": {
            "switchport": {
              "Cisco-IOS-XE-switch:access": {
                "vlan": {
                  "vlan": 10
                }
              }
            }
          },
          "switchport": {
            "Cisco-IOS-XE-switch:access": {
              "vlan": {
                "vlan": 10
              }
            }
          },
          "shutdown": [null]
        },
        {
          "name": "1/0/2",
          "shutdown": [null]
        },
        {
          "name": "1/0/3",
          "shutdown": [null]
        },
        {
          "name": "1/0/4",
          "shutdown": [null]
        },
        {
          "name": "1/0/5",
          "shutdown": [null]
        },
        {
          "name": "1/0/6",
          "shutdown": [null]
        },
        {
          "name": "1/0/7",
          "shutdown": [null]
        },
        {
          "name": "1/0/8",
          "shutdown": [null]
        }
      ],
      "Vlan": [
        {
          "name": 1
        },
        {
          "name": 10,
          "shutdown": [null]
        }
      ]
    },
    "control-plane": {
      "Cisco-IOS-XE-policy:service-policy": {
        "input": "system-cpp-policy"
      }
    },
    "aaa": {
      "Cisco-IOS-XE-aaa:new-model": [null],
      "Cisco-IOS-XE-aaa:group": {
        "server": {
          "tacacsplus": [
            {
              "name": "labtac",
              "server": {
                "name": [
                  {
                    "name": "sandboxtacacs"
                  }
                ]
              },
              "ip": {
                "tacacs": {
                  "source-interface": {
                    "GigabitEthernet": "0/0"
                  }
                },
                "vrf": {
                  "forwarding": "Mgmt-vrf"
                }
              }
            }
          ]
        }
      },
      "Cisco-IOS-XE-aaa:authentication": {
        "login": [
          {
            "name": "default",
            "a1": {
              "group": "labtac"
            },
            "a2": {
              "local": [null]
            }
          },
          {
            "name": "netconf-authn",
            "a1": {
              "group": "labtac"
            },
            "a2": {
              "local": [null]
            }
          }
        ]
      },
      "Cisco-IOS-XE-aaa:authorization": {
        "commands": [
          {
            "level": 1,
            "list-name": "default",
            "a1": {
              "group": "labtac"
            },
            "a2": {
              "local": [null]
            },
            "a3": {
              "if-authenticated": [null]
            },
            "group": "labtac",
            "if-authenticated": [null]
          },
          {
            "level": 15,
            "list-name": "default",
            "a1": {
              "group": "labtac"
            },
            "a2": {
              "local": [null]
            },
            "a3": {
              "if-authenticated": [null]
            },
            "group": "labtac",
            "if-authenticated": [null]
          }
        ],
        "exec": [
          {
            "name": "default",
            "a1": {
              "group": "labtac"
            },
            "a2": {
              "local": [null]
            },
            "a3": {
              "if-authenticated": [null]
            }
          },
          {
            "name": "netconf-authz",
            "a1": {
              "group": "labtac"
            },
            "a2": {
              "local": [null]
            }
          }
        ]
      },
      "Cisco-IOS-XE-aaa:session-id": "common"
    },
    "login": {
      "on-success": {
        "log": {
        }
      }
    },
    "redundancy": {
      "mode": "sso"
    },
    "spanning-tree": {
      "Cisco-IOS-XE-spanning-tree:extend": {
        "system-id": [null]
      },
      "Cisco-IOS-XE-spanning-tree:mode": "rapid-pvst"
    },
    "tacacs": {
      "Cisco-IOS-XE-aaa:server": [
        {
          "name": "sandboxtacacs",
          "address": {
            "ipv4": "10.17.248.43"
          },
          "key": {
            "encryption": "7",
            "key": "0502150A224D5A5112"
          }
        }
      ]
    },
    "tacacs-server": {
      "Cisco-IOS-XE-aaa:host": [
        {
          "name": "sandboxtacacs"
        }
      ]
    },
    "vtp": {
      "Cisco-IOS-XE-vtp:mode": {
        "server": {
        }
      }
    },
    "crypto": {
      "Cisco-IOS-XE-crypto:engine": {
        "compliance": {
          "shield": {
            "disable": [null]
          }
        }
      },
      "Cisco-IOS-XE-crypto:pki": {
        "trustpoint": [
          {
            "id": "SLA-TrustPoint",
            "enrollment": {
              "enrollment-method": {
                "pkcs12": [null]
              },
              "pkcs12": [null]
            },
            "hash": "sha512",
            "revocation-check": ["crl"]
          },
          {
            "id": "TP-self-signed-176228621",
            "enrollment": {
              "enrollment-method": {
                "selfsigned": [null]
              },
              "selfsigned": [null]
            },
            "hash": "sha512",
            "revocation-check": ["none"],
            "rsakeypair": {
              "key-label": "TP-self-signed-176228621"
            },
            "subject-name": "cn=IOS-Self-Signed-Certificate-176228621"
          }
        ]
      }
    },
    "line": {
      "console": [
        {
          "first": "0",
          "stopbits": "1"
        }
      ],
      "vty": [
        {
          "first": 0,
          "last": 4,
          "transport": {
            "input": {
              "ssh": true
            }
          }
        },
        {
          "first": 5,
          "last": 15,
          "transport": {
            "input": {
              "ssh": true
            }
          }
        }
      ]
    },
    "ntp": {
      "Cisco-IOS-XE-ntp:server": {
        "server-list": [
          {
            "ip-address": "10.17.251.250",
            "burst": false,
            "iburst": false
          }
        ]
      }
    },
    "Cisco-IOS-XE-diagnostics:diagnostic": {
      "bootup": {
        "level": "minimal"
      }
    }
  }
}

@vsirakov looks ok now 

❯ nc -zv devnetsandboxiosxec9k.cisco.com 22
Connection to devnetsandboxiosxec9k.cisco.com port 22 [tcp/ssh] succeeded!
Please mark this as helpful or solution accepted to help others
Connect with me https://bigevilbeard.github.io