[Contents]
[Prev]
[Next]
[Index]
[Report an Error]
Prerequisites for Outbound SSH
Connections
The outbound SSH feature allows the initiation
of an SSH session between JUNOS routers and Network and System Management
servers where client initiated TCP/IP connections are blocked (for
example when the router is behind a firewall). To configure outbound
SSH, you add an outbound-ssh configuration statement to the
JUNOS router. Once configured and committed, the JUNOS router will
begin to initiate an outbound SSH session with the configured management
clients. Once the outbound SSH session is initialized and the connection
is established, the Network and System Management server initiates
the SSH sequence as the client and the JUNOS device as the server
that authenticates the client.
Setting up outbound SSH involves:
- Configuring the JUNOS router for outbound SSH
- Configuring the management server for outbound SSH.
To configure the JUNOS router for outbound SSH:
- Satisfy the prerequisites discussed in Prerequisites
for All Access Protocols.
- In the [edit system services ssh] hierarchy level,
set the SSH protocol to v2:
[edit system services ssh]
set protocol-version v2
- Generate/obtain a public/private key pair for the JUNOS
router. This key pair will be used to encrypt the data transferred
across the SSH connection. For more information on generating key
pairs, see the System Basics Configuration Guide.
- If the public key will be installed on the application
management system manually, transfer the public key to the NSM server.
- Add the following outbound-ssh statement at the [edit system services] hierarchy level:
[edit system services]
outbound-ssh client {
application-id {
device-id device-id;
secret secret;
keep-alive {
retry number;
timeout number;
}
reconnect-strategy (sticky | in-order) ;
services netconf;
address {
port destination-port;
retry number;
timeout number;
}
}
}
The attributes are as follows:
- Commit the configuration:
- [edit]
- user@host# commit
To set up the Network and Systems Management Server:
- Satisfy the prerequisites discussed in Prerequisites
for All Access Protocols.
- Enable the application to access the SSH software.
- If the application uses the JUNOScript Perl
module provided by Juniper Networks, no action is necessary. As part
of the installation procedure for the Perl module, you install a prerequisites
package that includes the necessary SSH software. For instructions,
see Downloading the JUNOS Module and Sample Scripts.
- If the application does not use the JUNOScript
Perl module, obtain the SSH software and install it on the computer
where the application runs. For information about obtaining and installing
SSH software, see http://www.ssh.com and http://www.openssh.com.
- (Optional) Manually install the JUNOS router's public
key for use with the SSH connection.
- Configure the client system to receive an process initialization
broadcast requests. The intialization requests use the following syntax:
- If the secret attribute is configured, the JUNOS router
will send its public SSH key along with the intialization sequence
(recommended method). When the key has been received, the client needs
to determine what to do with the router’s public key. Juniper
recommends that you replace any current public SSH key for the router
with the new key. This ensures that the client always has the current
key available for authentication.
MSG-ID: DEVICE-CONN-INFO\r\n
MSG-VER: V1\r\n
DEVICE-ID: <device-id>\r\n
HOST-KEY: <pub-host-key>\r\n
HMAC: <HMAC(pub-SSH-host-key, <secret>)>\r\n
- If the secret attribute is not configured, the JUNOS router
does not send its public SSH key along with the initialization sequence.
You need to manually install the current public SSH key for the router.
MSG-ID: DEVICE-CONN-INFO\r\n
MSG-VER: V1\r\n
DEVICE-ID: <device-id>\r\n
[Contents]
[Prev]
[Next]
[Index]
[Report an Error]