06-30-2024 04:34 AM
We are experiencing an unusual issue concerning SSH connections to Cisco 9200L switches. We recently migrated from Cisco 2960 switches to Cisco 9200L models. When connecting from the same network using a Linux server, SSH to the switches works successfully. However, SSH connections from other networks are not successful.
The default gateway is correctly set, and SSH is enabled on the switches. Notably, we still have one Cisco 2960 switch that was not replaced, and we can SSH into it from other networks without any problems. The IP addresses of the switches are on the same subnet, and we can ping them from other networks, but SSH connections fail.
I have consulted with TAC support, and they have reviewed the configuration, indicating that it appears correct. I also provided them with packet captures but have not yet received further feedback. Has anyone else encountered a similar issue and could provide insights or suggestions?
Additionally, the SSH connection issue is intermittent from other networks, but consistently works when connecting from a server on the same subnet. Any recommendations would be appreciated.
Cisco 9200L version is - C9200L-24P-4X 17.14.01 CAT9K_LITE_IOSXE
06-30-2024 04:37 AM
can you share topolgy and from which point to try to access via SSH
MHM
06-30-2024 04:43 AM
For example, the management VLAN is on VLAN 99 with the network 192.168.99.x. Another VLAN is 100 with the network 192.168.100.x. We can ping the switches from VLAN 100 but are unable to SSH into them. However, we can establish a connection to the older 2960 switch from VLAN100. The only way to SSH into the 9200 switches is by either hopping from another switch or using a Linux server on the same management VLAN. Upon reviewing the community discussions, it appears that the 9200 series switches employ a different algorithm compared to the 2960 series.
06-30-2024 04:47 AM
sorry are there any FW in your Network
MHM
06-30-2024 04:52 AM
Yes, there are two firewalls configured for HA. However, I do not believe the issue is related to the firewalls, because, as I mentioned, the old Cisco 2960 switch is still accessible from other networks. The issue appears to be with the 9200L switches, which are not accessible. This is a very unusual problem.
06-30-2024 05:48 AM
2960 and 9300 SW how it connect to FW?
FW is statful device and allow traffic IN and OUT same interface same VLAN
if this not same the FW drop the traffic
MHM
06-30-2024 05:56 AM
The 9200L setup consists of a stack of three switches, connected as shown in the attached screenshot. All other 2960 switches have been replaced with 9200 models. Only one 2960 switch remains in the infrastructure, and it is the only one accessible via SSH.
06-30-2024 06:01 AM
these two link is config as port channel ?
MHM
07-01-2024 02:47 AM
Sorry for the delay. There isn't a port channel configured.
07-01-2024 03:47 AM
so two link from switch stack to two FW HA, there two link allow same vlan
I think this not correct,
return to your FW and check best FW HA design you must config PO between FW HA and stack SW or VSS or vPC
07-01-2024 01:12 PM
you can check if you have asymmetric routing by remove one link and check, I think it not effect your SSH only it will effect all other traffic
MHM
06-30-2024 05:37 AM
Hello,
Complete stab in the dark, but I am basing it on an issue I've seen not too long ago which was similar. Make sure the command "IP Classless" is configured on the switch you're trying to SSH to. If the line of config isn't in your current configuration, it will be enabled. Alternatively, just make sure that you've got the support SSH cipher suites enabled on your kit to make the SSH connection, but sounds like that's not a problem based on what you said in your original post.
06-30-2024 05:49 AM
Yes, it feels like stabbing in the dark. I've never encountered such an issue before. The command "ip classless" is already configured, but the problem still persists.
07-01-2024 03:59 AM
Hi there,
When you did the switch migration, was the configuration carried over as-is, e.g. same VLANs, management IP, default gateway / default route etc?
If you're unable to SSH from networks from outside the local subnet, but able to SSH from the same subnet, usually that's a default gateway / default route misconfiguration. It could be a subnet mask misconfiguration too (hence why I was asking about the "ip classless" configuration).
If you debug SSH transactions on your affected switch, do you see it reaching the switch from an affected source network?
06-30-2024 08:42 PM
Hello
Have you tried zerozising ssh and testing again?
crypto key zerosise
crypto key generate rsa general-keys modulus 2048
ip ssh version 2
or (if you have no local domain set)
crypto key generate rsa label SSH general-keys modulus 2048
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide