Users Guide

Table Of Contents
If your management station is running Microsoft Windows XP or Microsoft Windows Server 2003, you may experience an issue
with the characters in a CMC Telnet session. This issue may occur as a frozen login where the return key does not respond and
the password prompt does not appear.
To fix this issue, download hotfix 824810 from support.microsoft.com. For more information, you can also see Microsoft
Knowledge Base article 824810.
Using SSH with CMC
SSH is a command line session that includes the same capabilities as a Telnet session, but with session negotiation and
encryption to improve security. CMC supports SSH version 2 with password authentication. SSH is enabled on the CMC by
default.
NOTE: CMC does not support SSH version 1.
When an error occurs during the CMC login, the SSH client issues an error message. The message text is dependent on the
client and is not controlled by CMC. Review the RACLog messages to determine the cause of the failure.
NOTE: OpenSSH must be run from a VT100 or ANSI terminal emulator on Windows. You can also run OpenSSH using
Putty.exe. Running OpenSSH at the Windows command prompt does not provide full functionality (that is, some keys do
not respond and no graphics are displayed). On servers that run Linux, run SSH client services to connect to CMC with any
shell.
Four simultaneous SSH sessions are supported at a time. The session timeout is controlled by the
cfgSsnMgtSshIdleTimeout property. For more information about the RACADM commands, see the Dell Chassis
Management Controller for PowerEdge FX2/FX2s RACADM Command Line Reference Guide available at dell.com/support/
Manuals.
CMC also supports Public Key Authentication (PKA) over SSH. This authentication method improves SSH scripting automation
by removing the need to embed or prompt for user ID/password.
SSH is enabled by default. If SSH is disabled, then you can enable it using any other supported interface.
Supported SSH cryptography schemes
To communicate with CMC using SSH protocol, it supports multiple cryptography schemes listed in the following table.
Table 22. Cryptography Schemes
Scheme Type Scheme
Asymmetric Cryptography Diffie-Hellman DSA/DSS 5121024 (random) bits per NIST
specification
Symmetric Cryptography
AES256-CBC
RIJNDAEL256-CBC
AES192-CBC
RIJNDAEL192-CBC
AES128-CBC
RIJNDAEL128-CBC
BLOWFISH-128-CBC
3DES-192-CBC
ARCFOUR-128
Message Integrity
HMAC-SHA1-160
HMAC-SHA1-96
HMAC-MD5-128
HMAC-MD5-96
Authentication Password
112 Configuring CMC to use Command Line consoles