Before the configuration management server establishes an SSH connection with a router running the JUNOS software, you must satisfy the requirements discussed in the following sections:
The configuration management server handles the SSH connection between the configuration management server and the router. Therefore, the SSH software must be installed locally on the configuration management server. If the application uses the NETCONF Perl module provided by Juniper Networks, no further action is necessary. As part of the installation procedure for the Perl module, you install a prerequisites package that includes the necessary SSH software. If the application does not use the NETCONF Perl module, obtain the SSH software and install it on the computer where the application runs. For information about obtaining and installing SSH software, see http://www.ssh.com and http://www.openssh.com.
The configuration management server must log in to each routing running the JUNOS software when establishing a NETCONF session. Thus, each configuration management server needs a user account on each router where it will establish a NETCONF session. The following instructions explain how to create a JUNOS login account for the configuration management server. Alternatively, you can skip this section and enable authentication through RADIUS or TACACS+; for instructions, see the chapter about system authentication in the JUNOS System Basics Configuration Guide.
To determine if a JUNOS login account exists, enter JUNOS command-line interface (CLI) configuration mode on the router you wish to check, and issue the following commands:
- [edit]
- user@host# edit system login
-
- [edit system login]
- user@host# show user account-name
If the appropriate account does not exist, perform the following steps:
- [edit system login]
- user@host# set user account-name class class-name
- [edit system login]
- user@host# commit
The configuration management server needs an SSH public/private key pair, a text-based password, or both before it can authenticate with the NETCONF server. A public/private key pair is sufficient if the account is used only to connect to the NETCONF server through SSH. If the account is also used to access the router in other ways (for login on the console, for example), it must have a text-based password. The password is also used (the SSH server prompts for it) if key-based authentication is configured but fails.
![]() |
Note: You can skip this section if you have chosen to enable authentication through RADIUS or TACACS+, as described in the chapter about system authentication in the JUNOS System Basics Configuration Guide. |
Follow the instructions in the appropriate section:
The client application must be able to access the public/private keys or password you created in JUNOS Login Account Has Public/Private Key Pair or Password and provide it when the NETCONF server prompts for it.
There are several methods for enabling the application to access the key or password:
The IETF draft titled Using the NETCONF Configuration Protocol over Secure Shell (SSH) requires that the NETCONF server by default provide SSH access to client machines over a devoted Transmission Control Protocol (TCP) port, to make it easy to identify and filter NETCONF traffic. The port for the JUNOS NETCONF server is 32000. In addition, you can enable client applications to access the NETCONF server over the default SSH port (22). (For more information about the IETF draft, see Generating Well-Formed XML Documents.)
Perform the following steps:
- [edit system login user account-name authentication]
- user@host# top
-
- [edit]
- user@host# set system services netconf ssh
- [edit]
- user@host# set system services ssh
- [edit]
- user@host# commit