04-06-2022 01:44 AM
Hi everyone,
I have Catalyst 9200 which I use for CCTV camera switch. The switch is connected with another switch Aruba and another Catalyst 9200. The problem that I have is :
I cannot telnet from command prompt from command prompt to that main switch ( Could not open connection to the host, on port 23) . I already add command line vty but the result is the same.
Can anyone help me?
Solved! Go to Solution.
04-08-2022 07:51 PM - edited 04-08-2022 07:52 PM
SW(config)# aaa new-model <- you config this meaning you run AAA locally
SW(config-if)# aaa authentication login default local
!
SW(config)# line vty 0 4
SW(config)# transport input all <- optionally this allow both SSH & Telnet
SW(config-line)# login authentication default<- need this
04-06-2022 02:50 AM
@SigitP wrote:
I cannot telnet from command prompt from command prompt to that main switch
What is the error message?
04-06-2022 09:22 PM
Hi Leo,
this is the error message :
Could not open connection to the host, on port 23
04-06-2022 10:07 PM - edited 04-06-2022 10:08 PM
1. ACL
2. Is the VTY allowing telnet?
3. IF telnet is now allowed, how about SSH?
04-06-2022 10:41 PM
1. I don't use any ACL on the switch
2. How to check if telnet is allowed? I usually just type line vty then login authentication default.
3. I never used and set the switch for SSH
04-06-2022 11:53 PM
@SigitP wrote:
2. How to check if telnet is allowed? I usually just type line vty then login authentication default.
sh run | begin line vty 0
04-06-2022 06:01 AM
depend on Password
if password is local
you need login local under VTY,
this inform the router to search local username password.
04-06-2022 09:23 PM
after typing line vty, i already type authentication login default so i will use the same username and password
04-06-2022 11:14 PM
auth login default use with AAA server are you use any AAA server for auth ? or use local user/pass ?
if you use local/pass then you need
login local Not auth login default
04-07-2022 01:12 AM
I only use local user and pass
04-07-2022 01:23 AM
Directly connect the two 9200 together (and bypass the Aruba).
04-07-2022 01:42 AM - edited 04-07-2022 01:44 AM
Local User/Password "local mean save in SW" then you need only
Login Local,
please screenshot for telnet if you can ""remove the IP if it public IP""
04-08-2022 07:19 PM
Here I is my show running config
Building configuration...
Current configuration : 14823 bytes
!
! Last configuration change at 01:46:03 UTC Wed Apr 6 2022 by netadmin
!
version 17.3
service timestamps debug datetime msec
service timestamps log datetime msec
service call-home
platform punt-keepalive disable-kernel-core
!
hostname SW-Mainoffice-CCTV
!
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
logging console emergencies
--More-- !
!
!
!
aaa new-model
!
!
aaa authentication login default local
!
!
!
!
!
!
aaa session-id common
switch 1 provision c9200-24p
switch 2 provision c9200-24p
!
!
!
!
!
!
--More-- !
!
!
ip routing
!
!
!
!
!
!
!
!
login on-success log
ipv6 unicast-routing
!
!
no device-tracking logging theft
!
crypto pki trustpoint SLA-TrustPoint
enrollment pkcs12
revocation-check crl
!
crypto pki trustpoint TP-self-signed-599464963
--More-- enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-599464963
revocation-check none
rsakeypair TP-self-signed-599464963
!
!
crypto pki certificate chain SLA-TrustPoint
certificate ca 01
30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363
6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934
3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305
43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720
526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030
82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D
CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520
1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE
4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC
7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188
68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7
C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191
C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44
DFC7C6CF 04DD7FD1 02030100 01A34230 40300E06 03551D0F 0101FF04 04030201
--More-- 06300F06 03551D13 0101FF04 05300301 01FF301D 0603551D 0E041604 1449DC85
4B3D31E5 1B3E6A17 606AF333 3D3B4C73 E8300D06 092A8648 86F70D01 010B0500
03820101 00507F24 D3932A66 86025D9F E838AE5C 6D4DF6B0 49631C78 240DA905
604EDCDE FF4FED2B 77FC460E CD636FDB DD44681E 3A5673AB 9093D3B1 6C9E3D8B
D98987BF E40CBD9E 1AECA0C2 2189BB5C 8FA85686 CD98B646 5575B146 8DFC66A8
467A3DF4 4D565700 6ADF0F0D CF835015 3C04FF7C 21E878AC 11BA9CD2 55A9232C
7CA7B7E6 C1AF74F6 152E99B7 B1FCF9BB E973DE7F 5BDDEB86 C71E3B49 1765308B
5FB0DA06 B92AFE7F 494E8A9E 07B85737 F3A58BE1 1A48A229 C37C1E69 39F08678
80DDCD16 D6BACECA EEBC7CF9 8428787B 35202CDC 60E4616A B623CDBD 230E3AFB
418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0
D697DF7F 28
quit
crypto pki certificate chain TP-self-signed-599464963
certificate self-signed 01
3082032E 30820216 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 35393934 36343936 33301E17 0D323131 30313230 37343033
375A170D 33313130 31323037 34303337 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3539 39343634
39363330 82012230 0D06092A 864886F7 0D010101 05000382 010F0030 82010A02
82010100 BF710CA2 341E634D 9A02F4DF 7D744F0C 364CA0F6 2C45BD90 DB96F8DF
98D3FBB4 625EC09E F1B317AD 5497E97B 8EE120D1 A43190B7 4001A4F1 1F199013
5649AF51 39321D9C F7AB44D6 42FA5DF4 181717DA 9559589A E80826EF C2532F5B
--More-- 7719974E 1E98453C DB07F07D 466CC001 A74FA08F 96BB19E8 0EF48E7F 597489EB
21511F09 F3A54C65 5B0D4F5C CC2A89F3 BBE5C440 FC83BC4B A9F98BB3 192B4412
E8FE07A2 0B196D7B 7C2FEA48 948D5A25 9A13576C A8C312F2 50E89E09 B5EEC79C
82397465 34AB1A76 3661F2A0 DAD53AC8 928E088A 17AC7E3A EDEA8159 2ED35AD5
5BAD5998 CD73504E 7321A178 F0079A2E 777AE5EF 679DF5B3 871FB6A3 3D2DE6F1
CDCE51DF 02030100 01A35330 51300F06 03551D13 0101FF04 05300301 01FF301F
0603551D 23041830 168014CD A20FC8FD 98CD2EB8 02E72887 A3E4EF0B 667EC230
1D060355 1D0E0416 0414CDA2 0FC8FD98 CD2EB802 E72887A3 E4EF0B66 7EC2300D
06092A86 4886F70D 01010505 00038201 0100B31B 9A236074 F9CFC659 4DB2572B
ED053A9F 5DD64C70 09D16A9C 98B39D22 BE8367A6 121B2EA8 51135FBB 828B3DE5
638A6DDF 219A18BD E76FF191 2AD18CE2 3854EDE6 C7BF265A A733AE8C 07BE0C56
609831DA 47701B47 EA6A7004 B9FD3614 844A7046 93CC0F31 3313F8FA 876CDEB3
7481267E D90DB9D5 AB3B9556 4A3A2DA4 1C4ABD8B C47339F1 A92FB6EF 6AC8091F
6F3F5426 1BA3EDBE 54301557 E5FDC718 E57963CC 9A67C075 1DFF76B3 FA06AD45
73584DC9 64D899BD CABC0E51 04CC5C82 62C3A8AA FEA0734A 607A5429 753CE529
0A20924D 9E4906C5 ABDCAE59 FE48CCEE 25CAFC51 F2420D2E D5B3F717 CEAB7061
C7412F68 D2B8CB4F D759FB95 165C0B87 698E
quit
!
!
license boot level network-advantage addon dna-advantage
!
!
--More-- diagnostic bootup level minimal
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
memory free low-watermark processor 23108
!
username netadmin password 0
!
redundancy
mode sso
!
!
!
transceiver type all
monitoring
!
!
class-map match-any system-cpp-police-ewlc-control
description EWLC Control
class-map match-any system-cpp-police-topology-control
description Topology control
class-map match-any system-cpp-police-sw-forward
description Sw forwarding, L2 LVX data packets, LOGGING, Transit Traffic
--More-- class-map match-any system-cpp-default
description EWLC data, Inter FED Traffic
class-map match-any system-cpp-police-sys-data
description Openflow, Exception, EGR Exception, NFL Sampled Data, RPF Failed
class-map match-any system-cpp-police-punt-webauth
description Punt Webauth
class-map match-any system-cpp-police-l2lvx-control
description L2 LVX control packets
class-map match-any system-cpp-police-forus
description Forus Address resolution and Forus traffic
class-map match-any system-cpp-police-multicast-end-station
description MCAST END STATION
class-map match-any system-cpp-police-high-rate-app
description High Rate Applications
class-map match-any system-cpp-police-multicast
description MCAST Data
class-map match-any system-cpp-police-l2-control
description L2 control
class-map match-any system-cpp-police-dot1x-auth
description DOT1X Auth
class-map match-any system-cpp-police-data
description ICMP redirect, ICMP_GEN and BROADCAST
class-map match-any system-cpp-police-stackwise-virt-control
--More-- description Stackwise Virtual OOB
class-map match-any non-client-nrt-class
class-map match-any system-cpp-police-routing-control
description Routing control and Low Latency
class-map match-any system-cpp-police-protocol-snooping
description Protocol snooping
class-map match-any system-cpp-police-dhcp-snooping
description DHCP snooping
class-map match-any system-cpp-police-ios-routing
description L2 control, Topology control, Routing control, Low Latency
class-map match-any system-cpp-police-system-critical
description System Critical and Gold Pkt
class-map match-any system-cpp-police-ios-feature
description ICMPGEN,BROADCAST,ICMP,L2LVXCntrl,ProtoSnoop,PuntWebauth,MCASTData,Transit,DOT1XAuth,Swfwd,LOGGING,L2LVXData,ForusTraffic,ForusARP,McastEndStn,Openflow,Exception,EGRExcption,NflSampled,RpfFailed
!
policy-map system-cpp-policy
!
!
!
!
!
--More-- !
!
!
!
!
!
!
!
!
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
negotiation auto
!
interface GigabitEthernet1/0/1
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/2
switchport access vlan 192
switchport mode access
--More-- spanning-tree portfast
!
interface GigabitEthernet1/0/3
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/4
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/5
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/6
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/7
--More-- switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/8
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/9
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/10
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/11
switchport access vlan 191
switchport mode access
spanning-tree portfast
--More-- !
interface GigabitEthernet1/0/12
switchport access vlan 191
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/13
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/14
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/15
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/16
switchport access vlan 192
--More-- switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/17
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/18
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/19
switchport trunk native vlan 11
switchport mode trunk
spanning-tree portfast
!
interface GigabitEthernet1/0/20
switchport access vlan 192
switchport trunk native vlan 11
switchport mode trunk
spanning-tree portfast
--More-- !
interface GigabitEthernet1/0/21
switchport trunk native vlan 11
switchport mode trunk
spanning-tree portfast
!
interface GigabitEthernet1/0/22
switchport trunk native vlan 11
switchport mode trunk
spanning-tree portfast
!
interface GigabitEthernet1/0/23
switchport access vlan 250
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/24
switchport access vlan 191
switchport mode access
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
--More-- !
interface GigabitEthernet1/1/3
!
interface GigabitEthernet1/1/4
!
interface TenGigabitEthernet1/1/1
switchport trunk native vlan 11
switchport mode trunk
!
interface TenGigabitEthernet1/1/2
switchport trunk native vlan 11
switchport mode trunk
!
interface TenGigabitEthernet1/1/3
switchport trunk native vlan 11
switchport mode trunk
!
interface TenGigabitEthernet1/1/4
switchport trunk native vlan 11
switchport mode trunk
!
interface GigabitEthernet2/0/1
switchport access vlan 192
--More-- switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/2
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/3
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/4
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/5
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
--More-- interface GigabitEthernet2/0/6
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/7
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/8
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/9
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/10
switchport access vlan 192
switchport mode access
--More-- spanning-tree portfast
!
interface GigabitEthernet2/0/11
switchport access vlan 191
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/12
switchport access vlan 191
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/13
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/14
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/15
--More-- switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/16
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/17
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/18
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/19
switchport trunk native vlan 11
switchport mode trunk
spanning-tree portfast
--More-- !
interface GigabitEthernet2/0/20
switchport trunk native vlan 11
switchport mode trunk
spanning-tree portfast
!
interface GigabitEthernet2/0/21
switchport access vlan 11
switchport trunk native vlan 11
switchport mode trunk
spanning-tree portfast
!
interface GigabitEthernet2/0/22
switchport access vlan 192
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/23
switchport access vlan 250
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/24
--More-- switchport access vlan 191
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/1/1
!
interface GigabitEthernet2/1/2
!
interface GigabitEthernet2/1/3
!
interface GigabitEthernet2/1/4
!
interface TenGigabitEthernet2/1/1
switchport trunk native vlan 11
switchport mode trunk
!
interface TenGigabitEthernet2/1/2
switchport trunk native vlan 11
switchport mode trunk
!
interface TenGigabitEthernet2/1/3
switchport trunk native vlan 11
switchport mode trunk
--More-- !
interface TenGigabitEthernet2/1/4
switchport trunk native vlan 11
switchport mode trunk
!
interface Vlan1
ip address 192.168.1.1 255.255.255.0
!
interface Vlan11
ip address 10.11.1.1 255.255.255.0
!
interface Vlan191
ip address 10.19.1.1 255.255.255.0
!
interface Vlan192
ip address 10.19.2.1 255.255.255.0
!
interface Vlan193
ip address 10.19.3.1 255.255.255.0
!
interface Vlan250
ip address 192.168.250.254 255.255.255.0
!
--More-- ip forward-protocol nd
ip http server
ip http secure-server
!
!
!
!
!
!
!
!
!
control-plane
service-policy input system-cpp-policy
!
!
line con 0
exec-timeout 0 0
stopbits 1
line aux 0
stopbits 1
line vty 0 4
transport input ssh
--More-- line vty 5 15
transport input ssh
!
call-home
! If contact email address in call-home is configured as sch-smart-licensing@cisco.com
! the email address configured in Cisco Smart License Portal will be used as contact email address to send SCH notifications.
contact-email-addr sch-smart-licensing@cisco.com
profile "CiscoTAC-1"
active
destination transport-method http
!
!
!
!
!
!
end
04-08-2022 07:47 PM
@SigitP wrote:
transport input ssh
Only SSH is allowed.
Telnet is denied.
04-08-2022 07:51 PM - edited 04-08-2022 07:52 PM
SW(config)# aaa new-model <- you config this meaning you run AAA locally
SW(config-if)# aaa authentication login default local
!
SW(config)# line vty 0 4
SW(config)# transport input all <- optionally this allow both SSH & Telnet
SW(config-line)# login authentication default<- need this
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide