How to enable SSH remote access on Juniper ex-4200 switch.

How to enable SSH remote access on Juniper ex-4200 switch.
##step 1- assing password to root account in case the unit is factory defaults.
root# set system login user root authentication plain-text-password
New password:password
Retype new password:password
##step 2- creating a different user with read-only acccess
root# set system login user svnet authentication plain-text-password
New password:password
Retype new password:password
{master:0}[edit]
root#
root# set system login user svnet class read-only
{master:0}[edit]
root#
##step 3- enable ssh services on switch
root# set system services ssh
{master:0}[edit]
root# set system services ssh protocol-version v2
{master:0}[edit]
root#
## checking IP address on interface vme.0
root# run show interfaces *me* terse
Interface Admin Link Proto Local Remote
bme0 up up
bme0.32768 up up inet 128.0.0.1/2
128.0.0.16/2
128.0.0.32/2
tnp 0x10
me0 up up
me0.0 up up eth-switch
pime up up
vme up up
vme.0 up up inet 
192.168.0.66/24-------> ip address from a DHCP
{master:0}[edit]
root# commit
configuration check succeeds
commit complete
{master:0}[edit]
root#
root# exit
Exiting configuration mode
{master:0}
root>
## checking connectivity with the network.
root> ping 192.168.0.93
PING 192.168.0.93 (192.168.0.93): 56 data bytes
64 bytes from 192.168.0.93: icmp_seq=0 ttl=128 time=0.708 ms
64 bytes from 192.168.0.93: icmp_seq=1 ttl=128 time=0.698 ms
64 bytes from 192.168.0.93: icmp_seq=2 ttl=128 time=0.607 ms
64 bytes from 192.168.0.93: icmp_seq=3 ttl=128 time=0.778 ms
^C
--- 192.168.0.93 ping statistics ---
4 packets transmitted, 4 packets received, 0% packet loss
round-trip min/avg/max/stddev = 0.607/0.698/0.778/0.061 ms
{master:0}
root>
## SSH from automation container
root@NetworkAutomation-1:~# ssh svnet@192.168.0.66
The authenticity of host '192.168.0.66 (192.168.0.66)' can't be established.
ECDSA key fingerprint is SHA256:IVGnmR8KSp3XsRtoV7dUdIuMLFs9sCQ7SLkZfgZMIKs.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.0.66' (ECDSA) to the list of known hosts.
svnet@192.168.0.66's password:
--- JUNOS 12.3R3.4 built 2013-06-14 00:08:02 UTC
{master:0}
svnet> show version
fpc0:
--------------------------------------------------------------------------
Model: ex4200-48t
JUNOS Base OS boot [12.3R3.4]
JUNOS Base OS Software Suite [12.3R3.4]
JUNOS Kernel Software Suite [12.3R3.4]
JUNOS Crypto Software Suite [12.3R3.4]
JUNOS Online Documentation [12.3R3.4]
JUNOS Enterprise Software Suite [12.3R3.4]
JUNOS Packet Forwarding Engine Enterprise Software Suite [12.3R3.4]
JUNOS Routing Software Suite [12.3R3.4]
JUNOS Web Management [12.3R3.4]
JUNOS FIPS mode utilities [12.3R3.4]
{master:0}
svnet> show chassis hardware detail
Hardware inventory:
Item Version Part number Serial number Description
Chassis BP0209511916 EX4200-48T
Routing Engine 0 REV 19 750-021254 BP0209511*** EX4200-48T, 8 POE
Routing Engine 0 BP0209511916 EX4200-48T, 8 POE
FPC 0 REV 19 750-021254 BP0209511*** EX4200-48T, 8 POE
CPU BUILTIN BUILTIN FPC CPU
PIC 0 BUILTIN BUILTIN 48x 10/100/1000 Base-T
PIC 1 REV 04 711-026017 CH02093590** 2x 10GE SFP+
Power Supply 0 REV 04 740-020957 AT0509477** PS 320W AC
Power Supply 1 REV 04 740-020957 AT0509515** PS 320W AC
Fan Tray Fan Tray
{master:0}
svnet>
svnet> exit
Connection to 192.168.0.66 closed.
Thanks for watching suggestions always are welcome. Cheers🇳🇮😎


No comments:

Post a Comment