cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2010
Views
0
Helpful
7
Replies

Cisco 8300 enabling ssh

kuldeep.kaur
Level 1
Level 1

Hi Guys,

Having issues enabling ssh on the Cisco 8300 router.

I have configured hostname, domain name, authentication, rsa key, ip ssh version 2. but when i do sho ip ssh it says

SSH Disabled - version 2.0
%Please create RSA keys to enable SSH (and of atleast 2048 bits for SSH v2).
Authentication methods:publickey,keyboard-interactive,password
Authentication Publickey Algorithms:x509v3-ssh-rsa,ssh-rsa,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,x509v3-ecdsa-sha2-nistp256,x509v3-ecdsa-sha2-nistp384,x509v3-ecdsa-sha2-nistp521,rsa-sha2-256,rsa-sha2-512
Hostkey Algorithms:x509v3-ssh-rsa,rsa-sha2-512,rsa-sha2-256,ssh-rsa
Encryption Algorithms:aes128-gcm,aes256-gcm,aes128-ctr,aes192-ctr,aes256-ctr
MAC Algorithms:hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha2-512
KEX Algorithms:ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1
Authentication timeout: 120 secs; Authentication retries: 5
Minimum expected Diffie Hellman key size : 2048 bits
IOS Keys in SECSH format(ssh-rsa, base64 encoded): NONE

I have created rsa key with different key size as well but not able to enable ssh

Any suggestions ?

 

7 Replies 7

Hello,

 

Did you use at least 2048 bits of encryption for the RSA key? Did you also enable it on the VTY lines?

 

Can you show the whole config you used and the output when it was done?

 

-David

Hi David,

Below is the config

 


Cisco8300#show ip ssh
SSH Disabled - version 2.0
%Please create RSA keys to enable SSH (and of atleast 2048 bits for SSH v2).
Authentication methods:publickey,keyboard-interactive,password
Authentication Publickey Algorithms:x509v3-ssh-rsa,ssh-rsa,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,x509v3-ecdsa-sha2-nistp256,x509v3-ecdsa-sha2-nistp384,x509v3-ecdsa-sha2-nistp521,rsa-sha2-256,rsa-sha2-512
Hostkey Algorithms:x509v3-ssh-rsa,rsa-sha2-512,rsa-sha2-256,ssh-rsa
Encryption Algorithms:aes128-gcm,aes256-gcm,aes128-ctr,aes192-ctr,aes256-ctr
MAC Algorithms:hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha2-512
KEX Algorithms:ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1
Authentication timeout: 120 secs; Authentication retries: 5
Minimum expected Diffie Hellman key size : 2048 bits
IOS Keys in SECSH format(ssh-rsa, base64 encoded): NONE
Cisco8300#show run
Building configuration...

Current configuration : 6796 bytes
!
! Last configuration change at 02:06:07 UTC Tue Mar 7 2023 by cannondale
!
version 17.6
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
service call-home
platform qfp utilization monitor load 80
platform punt-keepalive disable-kernel-core
!
hostname CiscoRouter
!
boot-start-marker
boot-end-marker
!
!
enable secret 9 $9$NCbUqQtV/570eE$G31uAV9o5DQLS4819KxBTa5zyY/1vZJbDT83MajUhzM
!
aaa new-model
!
!
aaa authentication login localdb local
!
!
!
!
!
!
aaa session-id common
!
!
!
!
!
!
!
no ip domain lookup
ip domain name xxxxxxx
!
!
!
login on-success log
!
!
!
!
!
!
!
subscriber templating
multilink bundle-name authenticated
!
!
!
crypto pki trustpoint TP-self-signed-1006947040
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1006947040
revocation-check none
rsakeypair TP-self-signed-1006947040
!
crypto pki trustpoint SLA-TrustPoint
enrollment pkcs12
revocation-check crl
!
!
crypto pki certificate chain TP-self-signed-1006947040
certificate self-signed 01
30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31303036 39343730 3430301E 170D3233 30333036 30303238
30345A17 0D333330 33303530 30323830 345A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 30303639
34373034 30308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201
0A028201 0100D5A6 1CD24DA6 1E8D1E0A D7345D11 0B89682E 682E2221 F9767A0E
64FE7D1E D696901B D38EA100 8C72F949 B20015B8 D7D778B7 7D428BB6 2356851E
5A5CA2DD F5DC4838 9D89FD02 98A91A7E 3EE4363A 4F44EE82 6B120B02 E3C0E20D
1054AF8C 908046A3 15BFFAE5 5E078DCD FFC6E9E3 A568D432 246230BF AFBB6D5A
65AE15BF 2A26F979 8C2FDC3C BD0C6729 0214C4DE 7F5C65B8 69676323 A2714153
88E48247 F1FE506B 25A20EC8 BA06B3E2 ADC06ED4 67FB3A17 0122EED9 639F1E91
9023DD60 A0043DD0 CD21AB27 0E760705 3A631536 8E362D93 EF79424F A1FE98DF
C8EB6435 E202F9D1 B13959C8 C436E79D 68F4A88E A209F70E D1142D62 259271E8
2CEDAB4E DB210203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF
301F0603 551D2304 18301680 14951097 06718580 8A91E164 CD20D889 AE2D7F2E
EF301D06 03551D0E 04160414 95109706 7185808A 91E164CD 20D889AE 2D7F2EEF
300D0609 2A864886 F70D0101 05050003 82010100 B14F1979 5E7C38EF 8854912C
F7CA5835 E843A4AC E7420950 2FD7596F 8EF4D138 33C072D3 A4B8A29F 50580870
B18922A1 FF5E7EFA 36111C9E A2AE1EB4 774956B3 E52E4C3F 024E6642 38A1D191
E2ECB573 298AE8BF 166EE046 77A7C1B6 427E9BFF C12521C9 A03C916A EC6A6FC3
D7506EF8 2601DCA2 BEB532F9 BB4CB90C A2FFFB98 8A5406EC 1F079920 EE88DAC2
7C38A87E 536FE78F 10688DAB 2429550A 89A7BF24 C53D24F0 9110B2FB 45BAC98F
1F2B2031 70DAE0C8 8072D8F7 7E63B52E 101A9519 D32EB5A1 71F890FE 90074ACF
B97A7B16 C8A02C25 5AA2B2A9 4CDCC2BA 896FC082 9293E06A 74E84DF1 DE89CF72
BB2CCFBE 82A644AE C669EB3B 59E2FA73 00EDE87A
quit
crypto pki certificate chain SLA-TrustPoint
certificate ca 01
30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363
6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934
3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305
43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720
526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030
82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D
CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520
1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE
4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC
7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188
68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7
C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191
C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44
DFC7C6CF 04DD7FD1 02030100 01A34230 40300E06 03551D0F 0101FF04 04030201
06300F06 03551D13 0101FF04 05300301 01FF301D 0603551D 0E041604 1449DC85
4B3D31E5 1B3E6A17 606AF333 3D3B4C73 E8300D06 092A8648 86F70D01 010B0500
03820101 00507F24 D3932A66 86025D9F E838AE5C 6D4DF6B0 49631C78 240DA905
604EDCDE FF4FED2B 77FC460E CD636FDB DD44681E 3A5673AB 9093D3B1 6C9E3D8B
D98987BF E40CBD9E 1AECA0C2 2189BB5C 8FA85686 CD98B646 5575B146 8DFC66A8
467A3DF4 4D565700 6ADF0F0D CF835015 3C04FF7C 21E878AC 11BA9CD2 55A9232C
7CA7B7E6 C1AF74F6 152E99B7 B1FCF9BB E973DE7F 5BDDEB86 C71E3B49 1765308B
5FB0DA06 B92AFE7F 494E8A9E 07B85737 F3A58BE1 1A48A229 C37C1E69 39F08678
80DDCD16 D6BACECA EEBC7CF9 8428787B 35202CDC 60E4616A B623CDBD 230E3AFB
418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0
D697DF7F 28
quit
!
!
license udi pid C8300-1N1S-4T2X sn FDO2651M18R
memory free low-watermark processor 67522
!
diagnostic bootup level minimal
!
spanning-tree extend system-id
!
username xxxxxxxxxxxxxxxx
!
redundancy
mode none
!
!
!
!
!
!
!
!
interface GigabitEthernet0/0/0
ip address 10.xxxxxxxxxxx
negotiation auto
!
interface GigabitEthernet0/0/1
no ip address
shutdown
negotiation auto
!
interface GigabitEthernet0/0/2
no ip address
shutdown
negotiation auto
!
interface GigabitEthernet0/0/3
no ip address
shutdown
negotiation auto
!
interface TenGigabitEthernet0/0/4
no ip address
shutdown
negotiation auto
!
interface TenGigabitEthernet0/0/5
no ip address
shutdown
negotiation auto
!
ip default-gateway 10.xxxxxxxxxx
ip http server
ip http authentication local
ip http secure-server
ip forward-protocol nd
ip route 10.xxxxxxxxxxxxxxxx
ip route 10.xxxxxxxxxxxxxxxxxxxx
ip ssh authentication-retries 5
ip ssh rsa keypair-name sshkeys
ip ssh version 2
!
!
!
!
!
!
!
!
control-plane
!
!
line con 0
exec-timeout 15 0
privilege level 15
logging synchronous
login authentication localdb
transport output telnet ssh
stopbits 1
line aux 0
line vty 0 4
exec-timeout 15 0
privilege level 15
password 7 120A0D463F2B02546B7B71
logging synchronous
login authentication localdb
transport input telnet ssh
transport output telnet ssh
line vty 5 14
transport input ssh
!
call-home
! If contact email address in call-home is configured as sch-smart-licensing@cisco.com
! the email address configured in Cisco Smart License Portal will be used as contact email address to send SCH notifications.
contact-email-addr sch-smart-licensing@cisco.com
profile "CiscoTAC-1"
active
destination transport-method http
!
!
!
!
!
!
end

 

Here is the documetn for the router youre trying to do this on:

 

https://www.cisco.com/c/en/us/td/docs/routers/cloud_edge/c8300/software_config/cat8300swcfg-xe-17-book/isr9000swcfg-xe-16-12-book_chapter_011.html#task_758B3DF2FEF94A17AD4C768D8ED6465E

 

Can you provide all the commands you are entering exactly as you are entering it?

kuldeep.kaur
Level 1
Level 1

Yes generated keys so many times from 2048 to 4096 but no success

 

 

Can you provide the output of the commands you used AND a show running-config?

pieterh
VIP
VIP

ip ssh rsa keypair-name sshkeys

when the keypair is created it will report the key-name. This wil be <hostname>.<domainname> or TP-self-signed-1006947040
you must use that name in above command

confirm with Cisco8300#show ip ssh
...
IOS Keys in SECSH format(ssh-rsa, base64 encoded): NONE

johnlloyd_13
Level 9
Level 9

hi,

did you try with a different SSH client?

are you using putty or secure crt?

Review Cisco Networking products for a $25 gift card