cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
521
Views
4
Helpful
5
Replies

How to acces switch remote

athan1234
Level 3
Level 3

"I set up a switch, but I want to be able to access it; however, I can't access it via Telnet or HTTPS.

I believe the problem is that I did not set up the username. Is there any way to access it remotely?

I am attaching the main setup.

enable secret 9 $9$KkMgIVNmfnRs5E$uPJ/.n2Jcl2R2tgiFgH4oeD5ldhbwEtARFmnoNUjhZ.

no ip http server

ip http authentication local

ip http secure-server

ip forward-protocol nd

ip forward-protocol udp 47808

line con 0

 password cisco123/

 login

 stopbits 1

line aux 0

line vty 0 4

 password  cisco123

 login

 transport input ssh

line vty 5 15

 login

 transport input ssh

!

 transport input ssh

line vty 5 15

 login local

 transport input ssh

!

 

athan1234_0-1733600429607.png

Telnet 

athan1234_1-1733600505239.png

 

 

 

 

5 Replies 5

@athan1234 

 You need username and password . And you need to use SSH, not Telnet.

Two steps still needed

1- config mgmt vlan svi with IP and connect PC have IP in same subnet of mgmt vlan 

Note:- dont forget to config port that you connect you PC with same mgmt vlan

2- config username and password and privilege 15 

Note:- access via browser using https not http

MHM

shambhu.kumar
Spotlight
Spotlight

Hello,

Configure management vlan and assign a ip address and the default gateway in that vlan, if you want to SSH,

username xyz privilege 15 secret abc
enable secret klm

ip domain name xyz.com
crypto key generate rsa label SSH-KEY modulus 2048
ip ssh dh min size 2048
ip ssh rsa keypair-name SSH-KEY
ip ssh version 2

crypto key generate rsa
y
2048

!

ip ssh version 2
ip ssh time-out 60
ip ssh source-interface ( vlan )

!

line vty 0 15
exec-timeout 5 0
login
transport input ssh

 

Do you want to access through GUI, Please try this,

http authentication local
ip http secure-server
ip http client source-interface ( vlan )

 

 

Regards

I was checking  another configuration, and it is working. I can't see any important lines you mentioned. The setup is working via HTTPS and SSH.

crypto key generate rsa label SSH-KEY modulus 2048
ip ssh dh min size 2048
ip ssh rsa keypair-name SSH-KEY
ip ssh version 2

crypto key generate rsa
y
2048

!

ip ssh version 2
ip ssh time-out 60
ip ssh source-interface ( vlan )

 

ip http client source-interface ( vlan )

 

I have attached the resume. The setup is working via HTTPS and SSH

Building configuration...

Current configuration : 14420 bytes
!
! Last configuration change at 10:13:06 CET Mon Dec 9 2024 by admin
!
version 17.6
service timestamps debug datetime msec
service timestamps log datetime localtime
service call-home
platform punt-keepalive disable-kernel-core
!

!
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
enable secret 9 $9$KkMgIVNmf!
!
!
!
no aaa new-model
clock timezone CET 1 0
clock summer-time CET recurring last Sun Mar 2:00 last Sun Oct 3:00
switch 1 provision c9200l-24t-4g
switch 2 provision c9200l-24t-4g
!
!
!
!
vtp mode transparent
!
!
!
!
!
!
ip domain name arquitectura.com
!
!
!
login on-success log
!
crypto pki trustpoint SLA-TrustPoint
enrollment pkcs12
revocation-check crl
!
crypto pki trustpoint TP-self-signed-3225952808
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3225952808
revocation-check none
rsakeypair TP-self-signed-3225952808
!
!
crypto pki certificate chain SLA-TrustPoint
certificate ca 01
30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363
6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934
3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305
43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720
526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030
82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D
CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520
1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE
4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC
7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188
68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7
C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191
C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44
DFC7C6CF 04DD7FD1 02030100 01A34230 40300E06 03551D0F 0101FF04 04030201
06300F06 03551D13 0101FF04 05300301 01FF301D 0603551D 0E041604 1449DC85
4B3D31E5 1B3E6A17 606AF333 3D3B4C73 E8300D06 092A8648 86F70D01 010B0500
03820101 00507F24 D3932A66 86025D9F E838AE5C 6D4DF6B0 49631C78 240DA905
604EDCDE FF4FED2B 77FC460E CD636FDB DD44681E 3A5673AB 9093D3B1 6C9E3D8B
D98987BF E40CBD9E 1AECA0C2 2189BB5C 8FA85686 CD98B646 5575B146 8DFC66A8
467A3DF4 4D565700 6ADF0F0D CF835015 3C04FF7C 21E878AC 11BA9CD2 55A9232C
7CA7B7E6 C1AF74F6 152E99B7 B1FCF9BB E973DE7F 5BDDEB86 C71E3B49 1765308B
5FB0DA06 B92AFE7F 494E8A9E 07B85737 F3A58BE1 1A48A229 C37C1E69 39F08678
80DDCD16 D6BACECA EEBC7CF9 8428787B 35202CDC 60E4616A B623CDBD 230E3AFB
418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0
D697DF7F 28
quit
crypto pki certificate chain TP-self-signed-3225952808
certificate self-signed 01
30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 33323235 39353238 3038301E 170D3233 30383034 30393436
34335A17 0D333330 38303330 39343634 335A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 32323539
35323830 38308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201
0A028201 0100A1C3 EC714B39 34FD4572 089EFA00 B785C9D4 8C5D65E9 EC282D43
D854E845 E64D048B 38DC6376 A4028A1A AD0C652E 0F0BB374 CA13EF93 04A90B83
5C492174 490D73CE 7F1E1DCC C632218A FDCC7761 48023809 0E3E5DC4 CEEF57BC
F7FEDA0C AC7C0EFB 716E9A23 9C007F4F 921F4A00 78290623 216DCB1A 0CC5FEE3
6DF72C7C 4508C40B 138F3307 BD631587 A8012C11 DB06098E 59B289A6 F5594451
CD589AFA F05AE72F 3C1E9145 CB3C1D3F FD39355E FD61578C 6E3DEEB3 F1DD078D
F2A49C1A DBF607B1 2504CDBC 841C3FA3 CCFAC5F3 3013ECCC EF5ECC12 1A98B57A
A879720F EE116424 CD8AA280 F21B38BB 1E3D6164 E0EFC699 1372A48A 1D641E3E
AB47B049 369F0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF
301F0603 551D2304 18301680 14F2E47A 2C7ACF67 8FDF2C4B 54E22703 07463DDD
5A301D06 03551D0E 04160414 F2E47A2C 7ACF678F DF2C4B54 E2270307 463DDD5A
300D0609 2A864886 F70D0101 05050003 82010100 46F8F52B 81CABFF8 8AF66538
E287B935 43198032 162E08FA 6472FDDA AB29B277 9E111CF1 A49C3C58 2B357DD7
0FEE947B F5E2AF2A ECCC36A7 9542D991 B9425AC0 F246919D 7F9A6D92 1F309E28
6D3D6DA6 B2294105 7A8260C9 F43F4831 A50CCEDD 8E87EA70 FC69D407 99E50446
A90AB6FB 37D41F87 2E2D7A65 57342D20 C7FC6D9E F2F2C623 BE9B0EBF 92B8E1D5
9E7CD261 DF6A0B94 733188B4 F6C3192B 0137CAF8 0B6A17F4 CB71CF4F 4C79DDDD
BD009381 068D318A 5E1CB349 718F27F3 296085C7 0BD7592D 72658848 26983D14
B8557E91 12FB9134 F5E3BC14 9B0FDFF3 A8D6C6DB 373BB252 10208DD1 9F1E6777
06B1A52F 6284FC9F 3435B304 380C1679 40D55A75
quit
!
license boot level network-essentials addon dna-essentials
!
!
diagnostic bootup level minimal
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
memory free low-watermark processor 10317
!
username admin privilege 15 secret 9 $9$pTbTUFte0.QCaU$MFCXrAQeO77vGEwJ!
redundancy
mode sso
crypto engine compliance shield disable
!
!
transceiver type all
monitoring
!
vlan 5
_MGMT
!
vlan 300

!
vlan 400

!
lldp run
!
!
class-map match-any system-cpp-police-ewlc-control
description EWLC Control
class-map match-any system-cpp-police-topology-control
description Topology control
class-map match-any system-cpp-police-sw-forward
description Sw forwarding, L2 LVX data packets, LOGGING, Transit Traffic
class-map match-any system-cpp-default
description EWLC data, Inter FED Traffic
class-map match-any system-cpp-police-sys-data
description Openflow, Exception, EGR Exception, NFL Sampled Data, RPF Failed
class-map match-any system-cpp-police-punt-webauth
description Punt Webauth
class-map match-any system-cpp-police-l2lvx-control
description L2 LVX control packets
class-map match-any system-cpp-police-forus
description Forus Address resolution and Forus traffic
class-map match-any system-cpp-police-multicast-end-station
description MCAST END STATION
class-map match-any system-cpp-police-high-rate-app
description High Rate Applications
class-map match-any system-cpp-police-multicast
description MCAST Data
class-map match-any system-cpp-police-l2-control
description L2 control
class-map match-any system-cpp-police-dot1x-auth
description DOT1X Auth
class-map match-any system-cpp-police-data
description ICMP redirect, ICMP_GEN and BROADCAST
class-map match-any system-cpp-police-stackwise-virt-control
description Stackwise Virtual OOB
class-map match-any non-client-nrt-class
class-map match-any system-cpp-police-routing-control
description Routing control and Low Latency
class-map match-any system-cpp-police-protocol-snooping
description Protocol snooping
class-map match-any system-cpp-police-dhcp-snooping
description DHCP snooping
class-map match-any system-cpp-police-ios-routing
description L2 control, Topology control, Routing control, Low Latency
class-map match-any system-cpp-police-system-critical
description System Critical and Gold Pkt
class-map match-any system-cpp-police-ios-feature
description ICMPGEN,BROADCAST,ICMP,L2LVXCntrl,ProtoSnoop,PuntWebauth,MCASTData,Transit,DOT1XAuth,Swfwd,LOGGING,L2LVXData,ForusTraffic,ForusARP,McastEndStn,Openflow,Exception,EGRExcption,NflSampled,RpfFailed
!
policy-map system-cpp-policy
!
!
!
!
!
!
!
!
!
!
!
!
!
!
iinterface Vlan1
no ip address
!
interface Vlan5
ip address 10.10.5.66 255.255.255.0
!
ip default-gateway 10.10.5.1
ip forward-protocol nd
no ip http server
ip http authentication local
ip http secure-server
!
!
!
!
control-plane
service-policy input system-cpp-policy
!
!
line con 0
logging synchronous
login local
stopbits 1
line aux 0
line vty 0 4
login local
transport input ssh
line vty 5 15
login local
transport input ssh
!

I certainly agree with the suggestion that you need to use SSH rather than telnet. The partial config that was posted shows that remote access requires SSH

line vty 0 4

password cisco123

login

transport input ssh

It is not clear to me whether it is required to have a configured user ID or not. Since the vty are configured with a password it is possible that you might be able to login SSH using that password. The determining factor is whether that config has aaa new-model or not. without aaa new-model the password would be accepted. But if aaa new-model is configured then a configured ID and password would be required.

The posted partial config shows that HTTP is disabled. From the display in the OP it does appear that HTTPS is enabled. And it appears that it is prompting for a user name and password. 

HTH

Rick