Enabling Remote Access To The: Cisco Application Control Engine Module Administration Guide OL-9373-01
Enabling Remote Access To The: Cisco Application Control Engine Module Administration Guide OL-9373-01
Remote Access Configuration Quick Start Configuring Remote Network Management Traffic Services Configuring Telnet Management Sessions Configuring SSH Management Sessions Terminating an Active User Session Enabling ICMP Messages To the ACE Directly Accessing a User Context Through SSH Viewing Session Information Making a direct connection using a dedicated terminal attached to the Console port on the front of the ACE. Configuring terminal display attributes. Configuring terminal line settings for accessing the ACE by console or virtual terminal connection.
2-1
If you are operating in multiple contexts, observe the CLI prompt to verify that you are operating in the desired context. If necessary, log directly in to, or change to, the correct context.
host1/Admin# changeto C1 host1/C1#
The rest of the examples in this table use the Admin context for illustration purposes, unless otherwise specified. For details on creating contexts, refer to the Cisco Application Control Engine Module Virtualization Configuration Guide.
2.
3.
Create a class map that permits network management traffic to be received by the ACE based on the network management protocol (SSH, Telnet) and client source IP address.
host1/Admin(config)# class-map type management match-all SSH-ALLOW_CLASS host1/Admin(config-cmap-mgmt)# match protocol ssh source-address 172.16.10.0 255.255.255.254 host1/Admin(config-cmap-mgmt)# exit host1/Admin(config)# host1/Admin(config)# class-map type management match-all TELNET-ALLOW_CLASS host1/Admin(config-cmap-mgmt)# match protocol telnet source-address 172.16.10.0 255.255.255.254 host1/Admin(config-cmap-mgmt)# exit host1/Admin(config)#
2-2
OL-9373-01
Chapter 2
Enabling Remote Access to the ACE Remote Access Configuration Quick Start
Table 2-1
Configure a policy map that activates the SSH and Telnet management protocol classifications.
host1/Admin(config)# policy-map type management first-match REMOTE_MGMT_ALLOW_POLICY host1/Admin(config-pmap-mgmt)# class SSH-ALLOW_CLASS host1/Admin(config-pmap-mgmt-c)# permit host1/Admin(config-pmap-mgmt-c)# exit host1/Admin(config-pmap-mgmt)# class TELNET-ALLOW_CLASS host1/Admin(config-pmap-mgmt-c)# permit host1/Admin(config-pmap-mgmt-c)# exit host1/Admin(config-pmap-mgmt)# exit host1/Admin(config)#
5.
Attach the traffic policy to a single VLAN interface or globally to all VLAN interfaces in the same context. For example, to specify an interface VLAN and apply the remote management policy map to the VLAN, enter:
host1/Admin(config)# interface vlan 50 host1/Admin(config-if)# ip address 172.16.1.100 255.255.0.0 host1/Admin(config-if)# service-policy input REMOTE_MGMT_ALLOW_POLICY host1/Admin(config-if)# exit
6.
(Optional) Configure the maximum number of Telnet sessions allowed for each context.
host1/Admin(config)# telnet maxsessions 3
7.
(Optional) Configure the maximum number of SSH sessions allowed for each context.
host1/Admin(config)# ssh maxsessions 3
2-3
Table 2-1
For users with global administrator privileges, use the ssh key command to generate the SSH private key and the corresponding public key for use by the SSH server. There is only one host-key pair. For example, to generate an RSA1 key pair in the Admin context, enter:
host1/Admin(config)# ssh key rsa1 1024 generating rsa1 key ..... generated rsa1 key
9.
2-4
OL-9373-01
Chapter 2
Enabling Remote Access to the ACE Configuring Remote Network Management Traffic Services
Class mapProvides the remote network traffic match criteria to permit traffic based on:
 Remote access network management protocols (SSH, Telnet, ICMP)  Client source IP address
Policy mapEnables remote network management access for a traffic classification that matches the criteria listed in the class map. Service policyActivates the policy map, attaches the traffic policy to an interface or globally on all interfaces.
This section provides an overview on creating a class map, policy map, and service policy for remote network access. For detailed information on creating class maps, policy maps, and service policies, refer to Chapter 4, Configuring Class Maps and Policy Maps. Telnet and SSH remote access sessions are established to the ACE on a per context basis. For details on creating users and contexts, refer to the Cisco Application Control Engine Module Virtualization Configuration Guide. This section includes the following topics:
  
Creating and Configuring a Remote Management Class Map Creating a Layer 3 and Layer 4 Remote Access Policy Map Applying a Service Policy
2-5
match-all | match-any(Optional) Determines how the ACE evaluates Layer 3 and Layer 4 network management traffic when multiple match criteria exist in a class map. The class map is considered a match if the match commands meet one of the following conditions.
 match-all All of the match criteria listed in the class map are satisfied
to match the network traffic class in the class map, typically match commands of the same type.
 match-anyAny one of the match criteria listed in the class map is
satisfied to match the network traffic class in the class map, typically match commands of different types. The default setting is to meet all of the match criteria (match-all) in a class map.
map_nameSpecifies the name assigned to the class map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
2-6
OL-9373-01
Chapter 2
Enabling Remote Access to the ACE Configuring Remote Network Management Traffic Services
The CLI enters the class map management configuration mode. To classify the remote network management traffic received by the ACE, include one or more of the associated commands to configure the match criteria for the class map:
 
descriptionSee Defining a Class Map Description match protocolSee Defining Remote Network Management Protocol Match Criteria
You may include multiple match protocol commands in a class map. For example, to allow SSH and Telnet access to the ACE from IP address 172.16.10.0, enter:
host1/Admin(config)# class-map SSH-TELNET_ALLOW_CLASS host1/Admin(config-cmap-mgmt)# 172.16.10.0 255.255.255.254 host1/Admin(config-cmap-mgmt)# 172.16.10.0 255.255.255.254 host1/Admin(config-cmap-mgmt)# host1/Admin(config)# type management match-all match protocol ssh source-address match protocol telnet source-address exit
To remove a Layer 3 and Layer 4 network management class map from the ACE, enter:
host1/Admin(config)# no class-map type management match-all SSH-TELNET_ALLOW_CLASS
2-7
2-8
OL-9373-01
Chapter 2
Enabling Remote Access to the ACE Configuring Remote Network Management Traffic Services
The syntax of this command is: [line_number] match protocol {http | https | icmp | snmp | ssh | telnet} {any | source-address ip_address mask}
line_number(Optional) Assists you in editing or deleting individual match commands. Enter an integer from 2 to 255 as the line number. You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not dictate a priority or sequence for the match statements. httpSpecifies the Hypertext Transfer Protocol (HTTP). The configuration of the HTTP management protocol is covered in Chapter 9, Configuring the XML Interface. httpsSpecifies the secure (SSL) Hypertext Transfer Protocol (HTTP). The configuration of the HTTPS management protocol is covered in Chapter 9, Configuring the XML Interface. icmpSpecifies Internet Control Message Protocol messages to the ACE. The configuration of the ICMP management protocol is covered in this chapter. snmpSpecifies the Simple Network Management Protocol (SNMP). The configuration of the SNMP management protocol is covered in Chapter 8, Configuring SNMP. sshSpecifies a Secure Shell (SSH) remote connection to the ACE. The ACE supports the SSH remote shell functionality provided in SSH Version 1 and supports DES and 3DES ciphers. The configuration of the SSH management protocol is covered in this chapter. SSH v1.x and v2 are entirely different protocols and are not compatible. Make sure that you use an SSH v1.x client when accessing the ACE.
Note
telnetSpecifies a Telnet remote connection to the ACE. The configuration of the Telnet management protocol is covered in this chapter. anySpecifies any client source address for the management traffic classification.
2-9
source-addressSpecifies a client source host IP address and subnet mask as the network traffic matching criteria. As part of the classification, the ACE implicitly obtains the destination IP address from the interface on which you apply the policy map. ip_addressSource IP address of the client. Enter the IP address in dotted-decimal notation (for example, 192.168.11.1). maskThe subnet mask of the client in dotted-decimal notation (for example, 255.255.255.0).
For example, to specify that the class map allows SSH access to the ACE, enter:
host1/Admin(config)# class-map type management SSH-ALLOW_CLASS host1/Admin(config-cmap-mgmt)# match protocol ssh source-address 172.16.10.0 255.255.255.254
To deselect the specified network management protocol match criteria from the class map, enter:
host1/Admin(config-cmap-mgmt)# no match protocol ssh source-address 172.16.10.0 255.255.255.254
Use the policy-map type management configuration command to configure a Layer 3 and Layer 4 policy map that permits the ACE to receive the specified remote management protocols. The ACE executes the action for the first matching classification. The syntax of this command is: policy-map type management first-match map_name The map_name argument specifies the name assigned to the Layer 3 and Layer 4 network management policy map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. The CLI The CLI enters the policy map management configuration mode.
2-10
OL-9373-01
Chapter 2
Enabling Remote Access to the ACE Configuring Remote Network Management Traffic Services
For example, to create a Layer 3 and Layer 4 network traffic management policy map, enter:
host1/Admin(config) #policy-map type management first-match REMOTE_MGMT_ALLOW_POLICY host1/Admin(config-pmap-mgmt) #
2.
If desired, use the description command to provide a brief summary about the Layer 3 and Layer 4 remote management policy map. The syntax of this command is: description text Use the text argument to enter an unquoted text string with a maximum of 240 alphanumeric characters. For example, to specify a description that the policy map is to allow remote Telnet access, enter:
host1/Admin(config-pmap-mgmt)# description Allow Telnet access to the ACE
3.
To specify a traffic class created with the class-map command to associate network traffic with the traffic policy, use the class command. The syntax of this command is: class map_name The map_name argument specifies the name of a previously defined traffic class, configured with the class-map command, to associate traffic to the traffic policy. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. The CLI enters the policy map management class configuration mode.
2-11
For example, to specify an existing class map within the Layer 3 and Layer 4 remote access policy map, enter:
host1/Admin(config-pmap-mgmt)# class L4_REMOTE_ACCESS_CLASS host1/Admin(config-pmap-mgmt-c)#
To remove a class map from a Layer 3 and Layer 4 policy map, enter:
host1/Admin(config-pmap-mgmt)# no class L4_REMOTE_ACCESS_CLASS
4.
To manually insert a class map ahead of a previously specified class map, use the insert-before command. The ACE does not save sequence reordering through the insert-before command as part of the configuration. The syntax of this command is: class map_name1 insert-before map_name2 The arguments are:
 class map_name1Specifies the name of a previously defined traffic
class configured with the class-map command. Enter an unquoted text string with no spaces and a maximum of 64 characters.
 insert-before map_name2Places the current class map ahead of an
existing class map as specified by the map_name2 argument. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. For example, to use the insert-before command to define the sequential order of two class maps in the policy map, enter:
host1/Admin(config-pmap-c)# class L4_SSH_CLASS insert-before L4_REMOTE_ACCESS_CLASS
5.
To specify the class-default class map for the Layer 3 and Layer 4 traffic policy, use the class class-default command. All network traffic that fails to meet the other matching criteria in the named class map belongs to the default traffic class. If none of the specified classifications match, the ACE then matches the action specified under the class class-default command. The class-default. class map has an implicit match any statement in it such that it matches all traffic. For example, to use the class class-default command, enter:
host1/Admin(config-pmap)# class class-default host1/Admin(config-pmap-c)#
2-12
OL-9373-01
Chapter 2
Enabling Remote Access to the ACE Configuring Remote Network Management Traffic Services
6.
Specify the actions you want to apply to the Layer 3 and Layer 4 user-defined class map and, if appropriate, to the default class map. See the Defining Management Traffic Policy Actions section to define the different Layer 3 and Layer 4 network traffic polices and associated actions. For example, to specify a traffic management action for the Layer 3 and Layer 4 policy map, enter:
host1/Admin(config) #policy-map type management first-match REMOTE_MGMT_ALLOW_POLICY host1/Admin(config-pmap-mgmt)# class SSH-ALLOW_CLASS host1/Admin(config-pmap-mgmt-c)# permit host1/Admin(config-pmap-mgmt-c)# exit host1/Admin(config-pmap-mgmt)# class TELNET-ALLOW_CLASS host1/Admin(config-pmap-mgmt-c) #permit
2-13
For example, to create a Layer 3 and Layer 4 remote network traffic management policy map that permits SSH, Telnet, and ICMP connections to be received by the ACE, enter:
host1/Admin(config) #policy-map type management first-match REMOTE_MGMT_ALLOW_POLICY host1/Admin(config-pmap-mgmt)# class SSH-ALLOW_CLASS host1/Admin(config-pmap-mgmt-c) #permit host1/Admin(config-pmap-mgmt-c)# exit host1/Admin(config-pmap-mgmt)# class TELNET-ALLOW_CLASS host1/Admin(config-pmap-mgmt-c) #permit host1/Admin(config-pmap-mgmt-c)# exit host1/Admin(config-pmap-mgmt)# class ICMP-ALLOW_CLASS host1/Admin(config-pmap-mgmt-c) #permit host1/Admin(config-pmap-mgmt-c)# exit
For example, to create a policy map that restricts an ICMP connection by the ACE, enter:
host1/Admin(config) #policy-map type management first-action ICMP_RESTRICT_POLICY host1/Admin(config-pmap-mgmt)# class ICMP-ALLOW_CLASS host1/Admin(config-pmap-mgmt-c)# deny
Apply a previously created policy map. Attach the traffic policy to a specific VLAN interface or globally to all VLAN interfaces in the same context. Specify that the traffic policy is to be attached to the input direction of an interface.
The service-policy command is available at both the interface configuration mode and at the configuration mode. Specifying a policy map in the interface configuration mode applies the polciy map to a specific VLAN interface. Specifying a policy map in the configuration mode applies the policy to all of the VLAN interfaces associated with a context. The syntax of this command is: service-policy input policy_name
2-14
OL-9373-01
Chapter 2
Enabling Remote Access to the ACE Configuring Remote Network Management Traffic Services
inputSpecifies that the traffic policy is to be attached to the input direction of an interface. The traffic policy evaluates all traffic received by that interface. policy_nameSpecifies the name of a previously defined policy map, configured with a previously created policy-map command. The name can be a maximum of 40 alphanumeric characters.
For example, to specify an interface VLAN and apply the remote access policy map to a VLAN, enter:
host1/Admin(config)# interface vlan 50 host1/Admin(config-if)# ip address 172.16.1.100 255.255.0.0 host1/Admin(config-if)# service-policy input REMOTE_MGMT_ALLOW_POLICY
For example, to globally apply the remote access policy map to all of the VLANs associated with a context, enter:
host1/Admin(config)# service-policy input REMOTE_MGMT_ALLOW_POLICY
To globally detach the remote access traffic policy from all VLANs associated with a context, enter:
host1/Admin(config)# no service-policy input REMOTE_MGMT_ALLOW_POLICY
Individually from the last VLAN interface on which you applied the service policy Globally from all VLAN interfaces in the same context
the ACE automatically resets the associated service policy statistics. The ACE performs this action to provide a new starting point for the service policy statistics the next time you attach a traffic policy to a specific VLAN interface or globally to all VLAN interfaces in the same context.
2-15
Policy maps, applied globally in a context, are internally applied on all interfaces existing in the context. A policy activated on an interface overwrites any specified global policies for overlapping classification and actions The ACE allows only one policy of a specific feature type to be activated on a given interface.
To display service policy statistics for a Layer 3 and Layer 4 remote network traffic management policy map, use the show service-policy command in Exec mode. The syntax of this command is: show service-policy policy_name [detail] The keywords, options, and arguments are as follows:
policy_nameThe identifier of an existing policy map that is currently in service (applied to an interface) as an unquoted text string with a maximum of 64 alphanumeric characters. detail(Optional) Displays a more detailed listing of policy map statistics and status information.
Note
The ACE updates the counters that the show service-policy command displays after the applicable connections are closed. For example, to display service policy statistics for the REMOTE_MGMT_ALLOW_POLICY policy map, enter:
host1/Admin# show service-policy REMOTE_MGMT_ALLOW_POLICY Status : ACTIVE Description: Allow mgmt protocols ----------------------------------------Context Global Policy: service-policy: REMOTE_MGMT_ALLOW_POLICY
To clear the service policy statistics, use the clear service-policy command. The syntax of this command is: clear service-policy policy_name
2-16
OL-9373-01
Chapter 2
For the policy_name argument, enter the identifier of an existing policy map that is currently in service (applied to an interface). For example, to clear the statistics for the policy map REMOTE_MGMT_ALLOW_POLICY that is currently in service, enter:
host1/Admin# clear service-policy REMOTE_MGMT_ALLOW_POLICY
Four concurrent Telnet management sessions for each user context Sixteen concurrent Telnet management sessions for the Admin context
Use the telnet maxsessions command in configuration mode to control the maximum number of Telnet sessions allowed for each context. The ACE supports a total maximum of 256 concurrent Telnet sessions. Telnet remote access sessions are established on the ACE on a per context basis. You can create a context, assign an interface and IP address to it, and then log into the ACE by Telneting to that IP address. This capability allows you to specify a particular context when accessing the ACE. For details on creating users and contexts, refer to the Cisco Application Control Engine Module Virtualization Configuration Guide. The syntax of this command is: telnet maxsessions max_sessions The max_sessions argument sets the maximum number of concurrent Telnet sessions allowed for the associated context. The range is 1 to 4 Telnet sessions per user context; 1 to 16 Telnet sessions for the Admin context. The defaults are 4 (user context) and 16 (Admin context). For example, to configure the maximum number of concurrent Telnet sessions to 3 in the Admin context, enter:
host1/Admin(config)# telnet maxsessions 3
To revert to the default of 16 Telnet sessions for the Admin context, enter:
host1/Admin(config)# no telnet maxsessions
2-17
Configuring Maximum Number of SSH Sessions Generating SSH Host Key Pairs
SSH remote access sessions are established on the ACE on a per context basis. You can create a context, assign an interface and IP address to it, and then log into the ACE by using specifying an SSH session to that IP address. This capability allows you to specify a particular context when accessing the ACE. For details on creating users and contexts, refer to the Cisco Application Control Engine Module Virtualization Configuration Guide.
Four concurrent SSH management sessions for each user context Sixteen concurrent SSH management sessions for the Admin context
Use the ssh maxsessions command in configuration mode to control the maximum number of SSH sessions allowed for each context. The ACE supports a total maximum of 256 concurrent SSH sessions. The syntax of this command is: ssh maxsessions max_sessions The max_sessions argument sets the maximum number of concurrent SSH sessions allowed for the associated context. The range is 1 to 4 SSH sessions per user context; 1 to 16 SSH sessions for the Admin context. The defaults are 4 (user context) and 16 (Admin context). For example, to configure the maximum number of concurrent SSH sessions in the Admin context to 3, enter:
host1/Admin(config)# ssh maxsessions 3
To revert to the default of 16 Telnet sessions for the Admin context, enter:
host1/Admin(config)# no ssh maxsessions
2-18
OL-9373-01
Chapter 2
Note
If you are the administrator or another user authorized in the Admin context, use the changeto command in exec mode to move to the Admin context. An administrator can perform all allowable functions within the Admin context. Ensure that you have an SSH host key pair with the appropriate version before enabling the SSH service. The SSH service accepts three types of key pairs for use by SSH versions 1 and 2. Generate the SSH host key pair according to the SSH client version used. The number of bits specified for each key pair ranges from 768 to 4096. Use the ssh key command in configuration mode to generate the SSH private key and the corresponding public key for use by the SSH server. The syntax of this command is: ssh key {dsa | rsa | rsa1} [bits [force]] The arguments, keywords, and options are:
   
dsaGenerates the DSA key pair for the SSH version 2 protocol. rsaGenerates the RSA key pair for the SSH version 2 protocol. rsa1Generates the RSA1 key pair for the SSH version 1 protocol. bits(Optional) Specifies the number of bits for the key pair. For DSA, the range is from 768 to 2048. For RSA and RSA1, the range is from 768 to 4096. The greater the number of bits you specify, the longer it takes to generate the key. The default is 768.
2-19
force(Optional) Forces the generation of a DSA or RSA key even when previous keys exist. If the SSH key pair option is already generated for the required version, use the force option to overwrite the previously generated key pair.
Before you generate the key, set the host name and the domain name. These two settings are used in the key. Refer to Chapter 1, Setting Up the ACE, for details on setting a hostname and to the Cisco Application Control Engine Module Virtualization Configuration Guide for details on configuring a domain. For example, to generate an RSA1 key pair in the Admin context, enter:
host1/Admin(config)# ssh key rsa1 1024 generating rsa1 key ..... generated rsa1 key
To clear the public keys of all trusted hosts, use the clear ssh hosts Exec command. These keys are either sent to an SSH client by an SSH server or are entered manually. When a SSH connection is made from the ACE, the SSH client receives the public key and stores it locally. To clear all of these keys, use the clear ssh hosts command in Exec mode.
2-20
OL-9373-01
Chapter 2
clear ssh {session_id | hosts} clear telnet {session_id} session_idSpecifies the identifier of the SSH or Telnet session to disconnect. You can obtain the specific session_id value using either the show ssh session-info command or the show telnet command in Exec mode. See the Directly Accessing a User Context Through SSH section for details. hostsClears the list of trusted SSH hosts from the ACE configuration.
Class map to provide the ICMP network traffic match criteria for the ACE. Policy map to enable ICMP network management access to and from the ACE. Service policy to activate the policy map, attaches the traffic policy to an interface or globally on all interfaces, and specifies the direction in which the policy should be applied.
2-21
See the Configuring Remote Network Management Traffic Services section for details on configuring a network management class map, policy map, and service policy for the ACE. To allow ICMP messages to pass through the ACE, configure an ICMP ACL to permit or deny network connections based on the ICMP type (for example, echo, echo-reply, unreachable). Refer to the Cisco Application Control Engine Module Security Configuration Guide for details.
Note
If you only want to allow the ACE to ping a host (and allow the echo reply back to the interface), but not allow hosts to ping the ACE, enable the ICMP application protocol inspection function instead of defining a class map and policy map. Refer to Cisco Application Control Engine Module Security Configuration Guide for details. For example, to allow the ACE to receive ICMP pings, enter the following commands:
host1/Admin(config)# class-map type management match-all ICMP-ALLOW_CLASS host1/Admin(config-cmap-mgmt)# description Allow ICMP packets host1/Admin(config-cmap-mgmt)# match protocol icmp source-address 172.16.10.0 255.255.255.254 host1/Admin(config-cmap-mgmt)# exit host1/Admin(config)# policy-map type management first-action ICMP_ALLOW_POLICY host1/Admin(config-pmap-mgmt)# class ICMP-ALLOW_CLASS host1/Admin(config-pmap-mgmt-c)# permit host1/Admin(config-pmap-mgmt-c)# exit host1/Admin(config-pmap-mgmt)# exit host1/Admin(config)# interface vlan 50 host1/Admin(config-if)# ip address 172.16.1.100 255.255.0.0 host1/Admin(config-if)# service-policy input ICMP_ALLOW_POLICY
2-22
OL-9373-01
Chapter 2
Enabling Remote Access to the ACE Directly Accessing a User Context Through SSH
Create a user context (refer to the Cisco Application Control Engine Module Virtualization Configuration Guide).
host1/Admin(config)# context C1 host1/Admin(config-context)#
2.
Associate an existing VLAN with the user context so that the context can receive traffic classified for it (refer to the Cisco Application Control Engine Module Routing and Bridging Configuration Guide).
host1/Admin(config-context)# allocate-interface vlan 100
3.
Generate the SSH host key pair (see the Generating SSH Host Key Pairs section).
host1/Admin(config-context)# ssh key rsa1 1024 generating rsa1 key ..... generated rsa1 key
4.
In the Admin context, use the changeto command in Exec mode or use the do changeto command in configuration mode to change to the C1 context that you created in step 1 and enter global configuration mode in that context. Only users authenticated in the Admin context can use the changeto command.
host1/Admin(config-context)# do changeto C1 host1/C1(config-context)# exit host1/C1(config)#
2-23
5.
Configure the VLAN interface that you allocated to the user context in step 2. For example, assign an IP address to the interface and reenable the interface within the context with the no shutdown command. Refer to the Cisco Application Control Engine Module Routing and Bridging Configuration Guide.
host1/C1(config)# interface vlan 50 host1/C1(config-if)# ip address 192.168.1.1 255.255.255.0 host1/C1(config-if)# no shutdown host1/C1(config-if)# exit host1/C1(config)#
6.
Create an SSH remote management policy and apply the associated service policy to all VLAN interfaces or just to the VLAN interface allocated to the user context (see the Configuring Remote Network Management Traffic Services section).
host1/C1(config)# class-map type management match-all SSH-ALLOW_CLASS host1/C1(config-cmap-mgmt)# match protocol ssh source-address 172.16.10.0 255.255.255.254 host1/C1(config-cmap-mgmt)# exit host1/C1(config)# host1/C1(config) #policy-map type management first-match REMOTE_MGMT_ALLOW_POLICY host1/C1(config-pmap-mgmt)# class SSH-ALLOW_CLASS host1/C1(config-pmap-mgmt-c)# permit host1/C1(config-pmap-mgmt-c)# exit host1/C1(config)# interface vlan 50 host1/C1(config-if)# ip address 192.168.1.1 255.255.255.0 host1/C1(config-if)# service-policy input REMOTE_MGMT_ALLOW_POLICY host1/C1(config-if)# exit host1/C1(config)#
7.
Create an IP route (refer to the Cisco Application Control Engine Module Security Configuration Guide).
host1/C1(config)# ip route 0.0.0.0 255.255.255.0 192.168.4.8
From the SSH client, establish a remote SSH session to the IP address of the user context VLAN interface. Enter the password for the user context VLAN interface. The ACE CLI prompt appears in Exec mode of the user context.
host1/C1#
2-24
OL-9373-01
Chapter 2
Table 2-2 describes the fields in the show telnet command output.
Table 2-2 Field Descriptions for show telnet Command
Description Unique session identifier for the Telnet session IP address and port of the remote Telnet client Time since the Telnet connection request was received by the ACE
2-25
Use the show telnet maxsessions command in Exec mode to display the maximum number of enabled Telnet sessions. Only context administrators can view Telnet session information associated with a particular context. The syntax of this command is: show telnet maxsessions [context_name] The optional context_name argument specifies the name of the context for which you want to view the maximum number of Telnet sessions. The context_name argument is case-sensitive. For example, enter:
host1/Admin# show telnet maxsessions Maximum Sessions Allowed is 4
2-26
OL-9373-01
Chapter 2
Table 2-3 describes the fields in the show ssh session-info command output.
Table 2-3 Field Descriptions for show ssh session-info Command
Description Unique session identifier for the SSH session. IP address and port of the remote SSH client. Time since the SSH connection request was received by the ACE.
Use the show ssh maxsessions command in Exec mode to display the maximum number of enabled SSH sessions. Only context administrators can view SSH session information associated with a particular context. The syntax of this command is: show ssh maxsessions [context_name] The optional context_name argument specifies the name of the context that the context administrator wants to view the maximum number of SSH sessions. The context_name argument is case-sensitive. For example, enter:
host1/Admin# show ssh maxsessions Maximum Sessions Allowed is 4(SSH Server is enabled)
2-27
dsaSpecifies the DSA key pair for the SSH version 2 protocol. rsaSpecifies the RSA key pair for the SSH version 2 protocol. rsa1Specifies the RSA1 key pair for the SSH version 1 protocol.
2-28
OL-9373-01