[RCNI] ICX Switch 접근 방법 [ICX150 Student Guide]
Nowhere 와 Now here 의 차이

IT/ㄴ Ruckus

[RCNI] ICX Switch 접근 방법 [ICX150 Student Guide]

TIENE 2023. 12. 3. 17:03
반응형


1. Access Management

  1.1) 종류

   - Serial Console Port

   - Telnet

   - SSH

   - Web Management GUI

   - SNMP-based management apllications

   - RUCKUS SmartZone and RUCKUS Cloud

   - RUCKUS Unleashed

 

  1.2) Serial Console Port

     1.2.1) USB Type-C & RJ-45

          -  ICX7150 / ICX7550 / ICX7660 / ICX7850

 

     1.2.2) Mini-USB & RJ-45

          -  ICX7450 / ICX7750

 

 

 

  1.3) Remote Access Options

     1.3.1) Telnet

          -  08.0.90 부터는 기본 값이 Disable / 이전 버전은 Enable

Pod4-SW3#show telnet
Telnet server status: Enabled
Telnet connections (inbound):
 1      established, client ip address 192.168.6.106, user is super, privilege super-user
        using vrf default-vrf.

        2 second(s) in idle
 2      closed
 3      closed
 4      closed
 5      closed
 6      closed
 7      closed
 8      closed
 9      closed
 10     closed
Telnet connections (outbound):
 11     closed
 12     closed
 13     closed
 14     closed
 15     closed


telnet@Pod4-SW3#show telnet config
Telnet server                  : Enabled
Idle timeout (minutes)         : 4
Login timeout (minutes)        : 2
Login retries                  : 4
Authentication                 : Disabled
suppress-reject-message        : Disabled
Telnet IPv4 clients            : All
Telnet IPv6 clients            : All
Telnet IPv4 access-group       :
Telnet IPv6 access-group       :
telnet@Pod4-SW3#

 

 

 

     1.3.2) SSH

          -  08.0.90 부터는 기본 값이 Enable / 이전 버전은 Disable

Pod4-SW3#show ip ssh
Connection   Version     Encryption          Username          HMAC           Server Hostkey IP Address                   
Inbound:
1            SSH-2       aes256-ctr          super             hmac-sha1      ssh-rsa        192.168.6.106     
Outbound:

SSH-v2.0 enabled; hostkey: RSA(2048)

SSH@Pod4-SW3#show ip ssh sessions
SSH server status: Enabled
SSH copy-received-cos status: Disabled
SSH connections:
SSH connections (inbound):

 1      established, client ip address 192.168.6.106, server hostkey RSA, user is super, privilege super-user
        using vrf default-vrf.
        you are connecting to this session
 2      closed
 3      closed
 4      closed
 5      closed
 6      closed
 7      closed
 8      closed
 9      closed
 10     closed
SSH connection (outbound):
 11     closed
 12     closed
 13     closed
 14     closed
 15     closed
 16     closed
 17     closed                                                   
 18     closed
 19     closed
 20     closed
 21     closed
 22     closed
 23     closed
 24     closed
 25     closed
 26     closed
 27     closed
SSH@Pod4-SW3#

Pod4-SW3#show ip ssh config
SSH server                 : Enabled
SSH port                   : tcp\22
Host Key                   : RSA 2048
Encryption                 : aes256-cbc, aes192-cbc, aes128-cbc, aes256-ctr, aes192-ctr, aes128-ctr, 3des-cbc
Permit empty password      : No
Authentication methods     : Password, Public-key, Interactive
Authentication retries     : 3
Login timeout (seconds)    : 120
Idle timeout (minutes)     : 5
SCP                        : Enabled
SSH IPv4 clients           : All
SSH IPv6 clients           : All
SSH IPv4 access-group      :
SSH IPv6 access-group      :
SSH Client Keys            :
Client Rekey               : 0 Minute, 0 KB
Server Rekey               : 0 Minute, 0 KB
Pod4-SW3#

 

 

          -  SSH Server의 기능을 켜고 끄는 명령어 X

          - 가지고 있는 RSA 키값을 지우면 SSH Server가 Disabled로 변함

 

Pod4-SW3(config)#crypto key generate    
  dsa   generate dsa key pair
  ec    generate elliptical key pair
  rsa   generate rsa key pair
  <cr>

Pod4-SW3(config)#crypto key generate rsa 
  label     input rsa label
  modulus   generate rsa key size (1024/2048) in non-FIPS mode or 2048 in
            FIPS/CC mode
  <cr>

Pod4-SW3(config)#crypto key generate rsa mo
  modulus   generate rsa key size (1024/2048) in non-FIPS mode or 2048 in
            FIPS/CC mode
  <cr>

Pod4-SW3(config)#crypto key generate rsa modulus   
  DECIMAL   enter (1024/2048) in non-FIPS mode or 2048 in FIPS/CC mode

Pod4-SW3(config)#crypto key generate rsa modulus 2048
Creating RSA key pair, please wait...

Pod4-SW3(config)#

 

 

 

 

     1.3.3) Web Management GUI

          -  HTTP / HTTPS 모두 지원

          -  다수의 Read-Only Session Open 가능

SSH@Pod4-SW3#show running-config | include aaa
aaa authentication web-server default local
aaa authentication login default local
enable aaa console
SSH@Pod4-SW3#

 

 

 

          -  HTTP 접속

 

 

 

 

 

          -  HTTPS 접속

SSH@Pod4-SW3(config)#no web-management
  allow-no-password            Allow web server to have no password
  connection-receive-timeout   Web connection receive timeout
  enable                       Enable web management
  frame                        Allow to disable or enable a frame
  front-panel                  Enable front panel
  hp-top-tools                 Enable the support of HP TOP Tools
  http                         Enable/Disable http access
  https                        Enable/Disable HTTPS access
  list-menu                    Show web menu as a list
  page-menu                    Enable page menu
  page-size                    Maximum number of entries in a page
  refresh                      Page refresh (polling time) in seconds
  session-timeout              Web session timeout
  tcp-port                     http port (default port 80)
  <cr>

SSH@Pod4-SW3(config)#no web-management http
SSH@Pod4-SW3(config)#web-ma
  web-management                    Web management options

SSH@Pod4-SW3(config)#web-management https
SSH@Pod4-SW3(config)#
SSH@Pod4-SW3(config)#crypto-ssl certificate generate
SSH@Pod4-SW3(config)#
Creating certificate, please wait...

SSH@Pod4-SW3(config)#exit
SSH@Pod4-SW3#show web
HTTP server status: Disabled
HTTPS server status: Enabled
No web connection.

SSH@Pod4-SW3#
ssl-certificate creation is successful

SSH@Pod4-SW3#

 

 

  1.4) Management

     1.4.1) IP Address

          -  L2 = Switch 별 한 개의 MGMT IP와 Default Gateway만 가능

          -  L3 = Switch의 Port 별로 MGMT IP

 

 

     1.4.2) Ports

          -  Out Of Band(OOB) 가 존재하여 관리 가능

          -  08.0.50 부터 OOB Port에 MGMT VLAN이 설정되면 untagged port로 동작 

 

          -   OOB(L2 Image)

            -   MGMT Port(Int management 1) 이용

            -    MGMT Port 또는 전역 구성모드에서 관리 IP 설정 ( 둘이 동일함)

            -    MGMT Port VLAN 기본적으로 None 값이며 특정 VLAN MGMT VLAN으로 규정

             -   해당 VLAN 포함되는데 권장하지는 않음

            -    Inband 통한 접속에 영향을 받기 때문

            -    OOB MGMT Port로의 HTTP / SSH / TELNET 연결 차단 가능

            -    명령어 = Management exclude all oob

 

          -    OOB(L3 Image)

            -     MGMT Port(Int management 1) 이용

            -     관리 IP MGMT Port 설정된 IP 사용함

            -     MGMT Port VLAN 규정할 없다. (MGMT VLAN 지원 안함)

            -     MGMT Port VRF 기본적으로 default vrf 포함된다.

            -     Vrf 생성하고 이를 MGMT vrf 정의한다.

            -     Int managament 1 해당 vrf 포함한다. (VRF 지원 장비에서 구성)

            -     Inband Outband 모두 default vrf 포함되기 때문에 MGMT vrf 따로 구성해야한다.


2. Privilege EXEC Passwords

2.1) 종류

   - Cisco와 다르게 4가지의 레벨이 존재함

 

     2.1.1) Super User

          -  Switch에 완전한 RW / RO 접근 가능 (Administrator)

          - 이 Level만 Password Configuration이 가능

 

     2.1.2) Port Configuration

          -  Interface Configuration은 가능하지만, Global Parameter Configuration은 불가

 

     2.1.3) Read-Only

          -  Privilege EXEC Mode 접근은 가능하나, Read-Only

 

     2.1.4) Cloud User

          -  show command 사용 가능 / Cloud Management 시 사용


Pod4-SW3(config)#enable
  aaa                           Perform AAA on console
  cloud-only-password           cloud-only level password
  egress-acl-on-cpu-traffic     Enable Egress ACLs on CPU Traffic
  password-display              Password display control
  password-min-length           Minimum size of enable, local and line password strings
  port-config-password          Port level configuration password
  read-only-password            Read-only level password
  skip-page-display             Allow continuous display without page mode
  snmp                          SNMP access mode
  strict-password-enforcement   Enforce th password security to strict level
  super-user-password           Super-user level password
  telnet                        Telnet access control
  user                         
  <cr>

Pod4-SW3(config)#enable super-user-password Ruckus123
Pod4-SW3(config)#exit
Pod4-SW3#exit
Pod4-SW3>exit

Press Enter key to login

User Access Verification

Please Enter Login Name: super
Please Enter Password:
User login successful.

Pod4-SW3>en
Password:
Pod4-SW3#

반응형