
9-21
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 9 Accessing and Monitoring PIX Firewall
Using SSH for Remote System Management
Trace Channel Feature
The debug packet command sends its output to the Trace Channel. All other debug commands do not.
Use of Trace Channel changes the way you can view output on your screen during a PIX
Firewall console
or Telnet session.
If a debug command does not use Trace Channel, each session operates independently, which means any
commands started in the session only appear in the session. By default, a session not using Trace Channel
has output disabled by default.
The location of the Trace Channel depends on whether you have a simultaneous Telnet console session
running at the same time as the console session, or if you are using only the PIX
Firewall serial console:
• If you are only using the PIX Firewall serial console, all debug commands display on the serial
console.
• If you have both a serial console session and a Telnet console session accessing the console, then no
matter where you enter the debug commands, the output displays on the Telnet console session.
• If you have two or more Telnet console sessions, the first session is the Trace Channel. If that session
closes, the serial console session becomes the Trace Channel. The next Telnet console session that
accesses the console then becomes the Trace Channel.
The debug commands are shared between all Telnet and serial console sessions.
Note The downside of the Trace Channel feature is that if one administrator is using the serial console and
another administrator starts a Telnet console session, the output from the debug commands on the serial
console will suddenly stop without warning. In addition, the administrator on the Telnet console session
will suddenly be viewing debug command output, which may be unexpected. If you are using the serial
console and debug command output is not appearing, use the who command to see if a Telnet console
session is running.
Using SSH for Remote System Management
This section describes how to use Secure Shell (SSH) for remote access to the PIX Firewall console. It
includes the following topics:
• Overview, page 9-22
• Obtaining an SSH Client, page 9-22
• Identifying the Host Using an SSH Client, page 9-23
• Configuring Authentication for an SSH Client, page 9-24
• Connecting to the PIX Firewall with an SSH Client, page 9-24
• Viewing SSH Status, page 9-24
Komentarze do niniejszej Instrukcji