Users Guide

Table Of Contents
To fix this issue, download hotfix 824810 from support.microsoft.com. For more information, you can also see Microsoft Knowledge
Base article 824810.
In the command line interface, you can manage session timeouts using the racadm command, racadm getconfig -g
cfgSessionManagement. For more information, see the Chassis Management Controller Version for Dell PowerEdge VRTX Command
Line Reference Guide.
Using SSH With CMC
SSH is a command line session that includes the same capabilities as a Telnet session, but with session negotiation and encryption to
improve security. CMC supports SSH version 2 with password authentication. SSH is enabled on the CMC by default.
NOTE: CMC does not support SSH version 1.
When an error occurs during the CMC login, the SSH client issues an error message. The message text depends on the client and is not
controlled by CMC. Review the RACLog messages to determine the cause of the failure.
NOTE: OpenSSH must be run from a VT100 or ANSI terminal emulator on Windows. You can also run OpenSSH using
Putty.exe. Running OpenSSH at the Windows command prompt does not provide full functionality—that is, some keys
do not respond and no graphics are displayed. On servers that run Linux, run SSH client services to connect to CMC
with any shell.
Four simultaneous SSH sessions are supported at a time. The session timeout is controlled by the cfgSsnMgtSshIdleTimeout
property. You can check the various session timeouts, using the racadm command, getconfig -g cfgSessionManagement.
$ racadm getconfig -g cfgSessionManagement
cfgSsnMgtWebserverTimeout=1800
cfgSsnMgtTelnetIdleTimeout=1800
cfgSsnMgtSshIdleTimeout=1800
cfgSsnMgtRacadmTimeout=60
For more information about the RACADM commands, see the Chassis Management Controller for PowerEdge VRTX RACADM Command
Line Reference Guide available at dell.com/support/Manuals.
CMC also supports Public Key Authentication (PKA) over SSH. This authentication method improves SSH scripting automation by
removing the need to embed or prompt for user ID/password. For more information, see Configuring Public Key Authentication over SSH.
SSH is enabled by default. If SSH is disabled, then you can enable it using any other supported interface.
To configure SSH, see Configuring Services.
Supported SSH Cryptography Schemes
To communicate with CMC using SSH protocol, it supports multiple cryptography schemes listed in the following table.
Table 32. Cryptography Schemes
Scheme Type Scheme
Asymmetric Cryptography Diffie-Hellman DSA/DSS 512–1024 (random) bits per NIST specification
Symmetric Cryptography
AES256-CBC
RIJNDAEL256-CBC
AES192-CBC
RIJNDAEL192-CBC
AES128-CBC
RIJNDAEL128-CBC
BLOWFISH-128-CBC
3DES-192-CBC
ARCFOUR-128
Message Integrity
HMAC-SHA1-160
HMAC-SHA1-96
Configuring CMC to Use Command Line Consoles 139