Network devices usually managed through SSH services. Sometimes, those devices lost SSH access with ” The remote system refused the connection.” error message presenting on the SSH client such as SecureCRT. No matter how you tried from Internal or External interface, it is always same. Is there any configuration wrong? If yes, why did it work at last time?
Connection Version Mode Encryption Hmac State Username
0 2.0 IN aes256-cbc hmac-sha1 Session started user1
0 2.0 OUT aes256-cbc hmac-sha1 Session started user1
1 2.0 IN aes256-cbc hmac-sha1 Session started user1
1 2.0 OUT aes256-cbc hmac-sha1 Session started user1
2 2.0 IN aes256-cbc hmac-sha1 Session started user1
2 2.0 OUT aes256-cbc hmac-sha1 Session started user1
3 2.0 IN aes256-cbc hmac-sha1 Session started user2
3 2.0 OUT aes256-cbc hmac-sha1 Session started user2
4 2.0 IN aes256-cbc hmac-sha1 Session started user2
4 2.0 OUT aes256-cbc hmac-sha1 Session started user2
5 2.0 IN aes256-cbc hmac-sha1 Session started user1
5 2.0 OUT aes256-cbc hmac-sha1 Session started user1
6 2.0 IN aes256-cbc hmac-sha1 Session started user1
6 2.0 OUT aes256-cbc hmac-sha1 Session started user1
7 2.0 IN aes256-cbc hmac-sha1 Session started user1
7 2.0 OUT aes256-cbc hmac-sha1 Session started user1
8 2.0 IN aes256-cbc hmac-sha1 Session started user1
8 2.0 OUT aes256-cbc hmac-sha1 Session started user1
9 2.0 IN aes256-cbc hmac-sha1 Session started user1
9 2.0 OUT aes256-cbc hmac-sha1 Session started user1
10 2.0 IN aes256-cbc hmac-sha1 Session started user1
10 2.0 OUT aes256-cbc hmac-sha1 Session started user1
11 2.0 IN aes256-cbc hmac-sha1 Session started user1
11 2.0 OUT aes256-cbc hmac-sha1 Session started user1
12 2.0 IN aes256-cbc hmac-sha1 Session started user1
12 2.0 OUT aes256-cbc hmac-sha1 Session started user1
13 2.0 IN aes256-cbc hmac-sha1 Session started user1
13 2.0 OUT aes256-cbc hmac-sha1 Session started user1
14 2.0 IN aes256-cbc hmac-sha1 Session started user1
14 2.0 OUT aes256-cbc hmac-sha1 Session started user1
15 2.0 IN aes256-cbc hmac-sha1 Session started user1
15 2.0 OUT aes256-cbc hmac-sha1 Session started user1
%No SSHv1 server connections running.
Router1#show line
Tty Line Typ Tx/Rx A Modem Roty AccO AccI Uses Noise Overruns Int
* 0 0 CTY – – – – – 2 1 0/0 –
1 1 AUX 9600/9600 – – – – – 0 0 0/0 –
2 2 TTY 9600/9600 – – – – – 9 0 0/0 –
* 132 132 VTY – – – – 101 14 0 0/0 –
* 133 133 VTY – – – – 101 10 0 0/0 –
* 134 134 VTY – – – – 101 5 0 0/0 –
* 135 135 VTY – – – – 101 4 0 0/0 –
* 136 136 VTY – – – – 101 2 0 0/0 –
* 137 137 VTY – – – – 101 8 0 0/0 –
* 138 138 VTY – – – – 101 14 0 0/0 –
* 139 139 VTY – – – – 101 5 0 0/0 –
* 140 140 VTY – – – – 101 4 0 0/0 –
* 141 141 VTY – – – – 101 2 0 0/0 –
* 142 142 VTY – – – – 101 4 0 0/0 –
* 143 143 VTY – – – – 101 2 0 0/0 –
* 144 144 VTY – – – – 101 2 0 0/0 –
* 145 145 VTY – – – – 101 2 0 0/0 –
* 146 146 VTY – – – – 101 2 0 0/0 –
* 147 147 VTY – – – – 101 10 0 0/0 –
Line(s) not in async mode -or- with no hardware support:
3-131
Router1#show tcp brief | i .22_
319FCE3C 100.9.1.5.22 10.9.200.28.1903 ESTAB
2901D1E8 100.9.1.2.22 10.9.200.28.2526 FINWAIT1
301631E4 100.9.1.2.22 10.9.200.28.2486 ESTAB
29353A80 100.9.1.5.22 10.9.200.28.2735 ESTAB
28F53880 100.9.1.5.22 10.9.200.28.4035 ESTAB
293533DC 100.9.1.5.22 10.9.200.28.2293 ESTAB
28F408FC 100.9.1.2.22 10.9.200.28.3871 ESTAB
2933B460 100.9.1.2.22 10.9.200.14.8725 ESTAB
28F60DC8 100.9.1.5.22 10.9.200.28.2365 ESTAB
315D3BC0 100.9.1.5.22 10.9.200.28.2819 ESTAB
2934BD88 100.9.1.2.22 10.9.200.28.3128 ESTAB
31904740 100.9.1.2.22 10.9.200.14.8692 ESTAB
2901C298 100.9.1.5.22 10.9.200.28.3874 ESTAB
315D4264 100.9.1.5.22 10.9.200.28.3629 ESTAB
3151B7A4 100.9.1.2.22 10.9.200.28.2639 FINWAIT1
It seems all VTY lines have been used and for somehow system did not end those idle sessions although exec-timeout has been set.
Solution:
1. Clear line
Router2#clear line vty 0
[confirm]
[OK]
2. Set ssh time-out
ip ssh time-out 30
3. set absolute-timeout
line vty 0 15
absolute-timeout 15
4. Using service tcp-keepalives to Avoid Hung Telnet Sessions
http://www.cisco.com/en/US/tech/tk801/tk36/technologies_tech_note09186a00801365f3.shtml “If, however, Router 2 is reloaded for any reason, the terminal will not be able to get back into the server. Upon attempting to activate the connection, the user will see a “Connection refused by remote host” message. This message appears because the server believes that the previous telnet session is still connected, thus blocking a new session.“
Router1# config term Router1(config)# service tcp-keepalives-in Router1(config)# service tcp-keepalives-out Router1(config)# end
Hey very nice blog!I’m an instant fan, I have bookmarked you and I’ll be checking back on a regular.See u.
Pgp encryption