How to Establish a Reverse SSH to a Serial Device behind an AirLink device

Jan 11, 2016 - Author: Sierra Wireless - 14321 Views

This article applies to the GX/ES440, GX/ES450, GX400, LS300, LX60 and RV50/RV50X/RV55 AirLink devices.

 

Cable Required

When using a blue console cable to connect to a Cisco router, you must use an additional NULL modem DB9 adapter containing a DB9 male connector that is attached to the AirLink device’s serial port. The adapter may be required for other router vendors, depending on the router’s console port. 

 

Typical Console Cables:

 

AirLink devices support a DCE Female DB9. See DB9 pin-out at the end of this article.

 

Setting up a Reverse SSH connection

The following illustration shows a standard out-of-Band (OOB) connection between the AirLink device and a router:

 

 

Enabling the SSH server

Navigate to ACEmanager > Services > Telnet/SSH and select SSH as the Remote Login Server mode.

It is important to enter the Remote Login Server Telnet/SSH port which is Port “2332” by default. This is the port that will be used when establishing SSH sessions.

 
Notes:

  • Since you have enabled the SSH server, you will be reaching the connected serial device by establishing a Reverse SSH session. Basically, Telnet has been disabled.
  • Keep in mind when opening SSH sessions that the port to be used is the Remote Login Server Telnet/SSH port.

Enabling Reverse Telnet/SSH

Navigate to ACEmanager > Serial: Port Configuration and set Startup Mode Default to “Reverse Telnet/SSH”. Configure the serial port to match your serial device. Most routers console ports are set to 9600, 8N1.

Additional Notes:

  • The Auto login option is not supported when establishing Reverse SSH connections.
  • The Device Port is not used at all for Reverse SSH connections. 

 

Testing SSH into a connected device

To test Reverse SSH functionality open any SSH application (e.g. “putty.exe”).

The following screen shot shows an example configuration from putty.exe. Replace Mode WANIP with the cellular IP address of the AirLink device from your Mobile Network Operator. For example: 166.10.10.10.

 

A message similar to the following is displayed:

 

If the correct cable is in use and the router is accepting OOB messages, a prompt will appear for the SSH login credentials. You must provide ALEOS Reverse Telnet/SSH credentials (username: sconsole, and password: 12345). Afterwords, a prompt for the router’s console login credentials username and password will appear.

Note: if you use the default credentials (user: user and password: 12345), a normal AT command session will be established.

 

Reverse SSH and VPN

When the AirLink device is connected to a VPN, assuming it has the default device IP 192.168.13.31, you can access the OOB router on the serial console port from a computer on the VPN network establishing an SSH session to IP 192.168.13.31 on Port 2332. Please note that it is using the device LAN IP or Device IP address.
The connection is redirected to the device’s serial port, which in turn makes the connection to the router, as shown below:

*If the device has a VPN Split tunnel enabled, it means the ACEmanager out-of-band is set to "Allowed". It is possible to access the OOB router’s console port using the device’s Public WAN IP address, for example, SSH to 166.10.10.10 on Port 2332 by default.

 

Troubleshooting

I am attempting an SSH connection on a specified SSH port, but the connection times out.

There are several possible reasons for this. First of all, the device should have a public IP address that can be accessed from the Internet. Test device access by using ACEmanager on Port 9191, and then try to make the connection using SSH on the default ALEOS Port, 2332. If that works, ensure that Reverse Telnet/SSH has been set to SSH. Verify that the serial port configuration matches your serial device, and check the console cable.

 

I can establish an SSH connection with the Remote login Server Telnet/SSH port, but it does not prompt for the router’s console login credentials.

Check the console cable. Reverse Telnet/SSH is a stable feature, however hardware issues arise in the field mostly because of incorrect console cables or DB9 adapters. Be sure to use console cables specified by the router’s manufacturer. In most cases, a DB9 null adapter is required.

 

When Reverse Telnet/SSH is enabled, can I still connect to the device using Telnet to Port 2332?

No. It is not possible to use Telnet on Port 2332 once SSH has been enabled. The AirLink device only accepts SSH connections on the Reverse login server Telnet/SSH port, as shown in ACEmanager > Services > Telnet/SSH. Depending on whether you are using user: user or sconsole, you will be redirected to either an AT command session or an SSH to serial port.

 

What is the DB9 pin-out for the AirLink device?

 

What are the DB9 and RJ45 standard pin-outs for Cisco cables?

This is described in the following diagram:

 


©2024 Sierra Wireless. All rights reserved.
×
You have been successfully unsubscribed to this product. To access your subscription click here.