on a 2511, which i am using as a serial console server for a bunch
of boxes, how do i send a <break> on one of the lines?
randy
on a 2511, which i am using as a serial console server for a bunch
of boxes, how do i send a <break> on one of the lines?
randy
clear line x
on a 2511, which i am using as a serial console server for a bunch
of boxes, how do i send a <break> on one of the lines?
sends a <break> code to line x? are you sure?
randy
ctrl-shift-6 b I believe.
Jason
Randy Bush wrote:
on a 2511, which i am using as a serial console server for a bunch
of boxes, how do i send a <break> on one of the lines?
Doesn�t the usual way work? Which is that you telnet escape and say "send brk" to the prompt?
No idea if there is similar facility in ssh.
Pete
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Randy Bush wrote:
on a 2511, which i am using as a serial console server for a bunch
of boxes, how do i send a <break> on one of the lines?
The terminal emulation app that you use should have the capability to send
a telnet break to the terminal server. The terminal server in turn will
assert physical break on the line connected to the device.
There are a couple of line commands that can affect the behavior when
certain telnet commands are received. Specifically:
telnet break-on-ip
To cause the system to generate a hardware BREAK signal on the EIA/TIA-232
line that is associated with a reverse Telnet connection when a Telnet
Interrupt-Process command is received on that connection, use the telnet
break-on-ip command in line configuration mode.
telnet sync-on-break
To configure the Cisco IOS software to cause an incoming connection to
send a Telnet Synchronize signal when it receives a Telnet BREAK signal,
use the telnet sync-on-break command in line configuration mode. To disable
this function, use the no form of this command.
- --
on a 2511, which i am using as a serial console server for a bunch
of boxes, how do i send a <break> on one of the lines?
If you telnet into 2511 port 2000+line#, you can escape to command mode
of your telnet client and tell the client to "send break". Works here.
Steinar Haug, Nethelp consulting, sthaug@nethelp.no
that would be the secret send break cmd sequence
<ctrl> + ]
might be what you're after
Steve
to further clarify
on a 2511, which i am using as a serial console server for a bunch
of boxes, how do i send a <break> on one of the lines?
i am not telnetting anywhere on the net. i would deinstall telnet
if it was an option in freebsd build. hence, i can not ^[ and send
break.
i am sshing into the 2511 and then issuing the equivalent of
telnet 127.0.0.1 line#
notice that, though this is telnet, it just goes over a serial
cable to the serial console of the device to which i wish to send
a break.
Jason Slagle <raistlin@tacorp.net> saying "ctrl-shift-6 b" is the
nearest i have heard.
randy
Whatever your telnet/ssh client uses to send a break signal.
In most UNIX telnet clients it's escape char (usually '^['), then "send break"
Most PC ssh/telnet clients use shift-break, or ctrl-break.
/cah
Randy Bush <randy@psg.com> writes:
on a 2511, which i am using as a serial console server for a bunch
of boxes, how do i send a <break> on one of the lines?
telnet break is translated to long-space serial break:
rs@valhalla [6] % telnet scrapheap 2003
Trying 10.1.1.25
Connected to 10.1.1.25.
Escape character is '^]'.
User Access Verification
Password:
Password OK
installhost console login:
installhost console login:
send break
Type 'go' to resume
ok
quit
Connection closed.
rs@valhalla [7] %
rs@valhalla [6] % telnet scrapheap 2003
Trying 10.1.1.25
Connected to 10.1.1.25.
Escape character is '^]'.User Access Verification
Password:
Password OKinstallhost console login:
installhost console login:
> send break
Type 'go' to resume
ok
> quit
Connection closed.
rs@valhalla [7] %
i am seriously shocked by the number of folk in this forum who not
only seem to use telnet over the internet, but seem willing to
advertise it.
randy
This may require 'escape-character BREAK' in the line or con directive to
have the desired result.
J.
Randy Bush <randy@psg.com> writes:
> rs@valhalla [6] % telnet scrapheap 2003
> Trying 10.1.1.25
> Connected to 10.1.1.25.
> Escape character is '^]'.i am seriously shocked by the number of folk in this forum who not
only seem to use telnet over the internet, but seem willing to
advertise it.
not as shocked as i am that a co-author of at least ten rfcs and
perpetual ietf attendee doesn't recognize an rfc1918 address when he
sees it, even when given the big hint of a hostname that does not
appear in the global dns.
can you say "lab network"?
---Rob
I don't know how you run your lab nets, but if I have something on a lab net,
it still gets secured the same way as a world-visible machine would.
1) That protects it if ever I add a gateway machine that talks to the world.
2) It keeps you in the habit of securing *everything*.
Apparently, the knee-jerk 'ewww' at using telnet, even on a lab network, wasn't
ingrained enough to configure ssh instead... Thus there's indeed a high likelyhood
that there's still telnet being used in some corner of the production net....
as we all fall over ourselves to prove to the world how cool we are by
busting on robs lab demo and by the way, also mentioning in passing how
secure our labs are, and how rigorously we engineer them, perhaps one
might take the time to consider the fact that perhaps rob enabled this
in his lab to illustrate his answer.
/vijay
serious question just to play devils advocate
whats the difference between telnet from a directly connected host and a serial
line? all the issues with the former can be applied to the latter cant they?
Steve
whats the difference between telnet from a directly connected host and a
serial line?
if the 'directly connected host' is on multi-point medium, then it
is subject to sniff attacks
randy
I realised that but you can 'sniff' a serial line if you physically tap it,
you're saying you can setup a span port much easier as its software tho right?
but that requires you to have compromised the switch and an attached server,
that in itself should be throwing up some alarms - rancid, tripwire etc?
it would be easier to hack the host directly and install a keylogger, only one
hack to do that way and you can grab any passwds from telnet or ssh sessions
Steve
that requires you to have compromised the switch and an attached server
sadly not
randy
Good, honest to ${D**ty} Operational Content?