Users Guide

In the command line interface, you can manage session timeouts using the racadm command, racadm getconfig -g
cfgSessionManagement. For more information, see the Chassis Management Controller for Dell PowerEdge M1000e RACADM
Command Line Reference Guide
.
Using SSH With CMC
SSH is a command line session that includes the same capabilities as a Telnet session, but with session negotiation and encryption to
improve security. The CMC supports SSH version 2 with password authentication. SSH is enabled on the CMC by default.
NOTE: CMC does not support SSH version 1.
When an error occurs during the CMC login, the SSH client issues an error message. The message text is dependent on the client
and is not controlled by CMC. Review the RACLog messages to determine the cause of the failure.
NOTE: OpenSSH must be run from a VT100 or ANSI terminal emulator on Windows. You can also run OpenSSH using
Putty.exe. Running OpenSSH at the Windows command prompt does not provide full functionality (that is, some keys do
not respond and no graphics are displayed). For systems running Linux, run SSH client services to connect to CMC with
any shell.
Four simultaneous SSH sessions are supported at a time. The session timeout is controlled by the cfgSsnMgtSshIdleTimeout
property. For more information, see the database property chapter of the Chassis Management Controller for Dell PowerEdge
M1000e RACADM Command Line Reference Guide, the Services Management page in the Web interface, or see Conguring
Services.
CMC also supports Public Key Authentication (PKA) over SSH. This authentication method improves SSH scripting automation by
removing the need to embed or prompt for user ID/password. For more information, see Congure Public Key Authentication over
SSH.
SSH is enabled by default. If SSH is disabled, then you can enable it using any other supported interface.
To congure SSH, see Conguring Services.
Related link
Conguring Services
Supported SSH Cryptography Schemes
To communicate with CMC using SSH protocol, it supports multiple cryptography schemes listed in the following table.
Table 32. Cryptography Schemes
Scheme Type Scheme
Asymmetric Cryptography Die-Hellman DSA/DSS 5121024 (random) bits per NIST specication
Symmetric Cryptography
AES256-CBC
RIJNDAEL256-CBC
AES192-CBC
RIJNDAEL192-CBC
AES128-CBC
RIJNDAEL128-CBC
BLOWFISH-128-CBC
3DES-192-CBC
ARCFOUR-128
Message Integrity
HMAC-SHA1-160
HMAC-SHA1-96
HMAC-MD5-128
HMAC-MD5-96
Authentication Password
146