If you want to use SSH to access remote servers during network discovery, you can configure a CA Configuration Automation Network Scan Policy to use a public/private key pair to secure communications.
To generate the key pair files
ssh-keygen -t rsa
The following prompt appears:
Generating public/private rsa key pair. Enter file in which to save the key (home/Administrator/.ssh/id_rsa):
You are prompted to enter a passphrase:
Enter passphrase (empty for no passphrase)
You are prompted to confirm the passphrase:
Enter same passphrase again
The following confirmation appears:
Your identification has been saved in /home/Administrator/.ssh/id_rsa Your public key has been saved in /home/Administrator/.ssh/id_rsa.pub The key fingerprint is: 45:gd:b1:3e:c0:92:18:44:7b:e6:tc:d5:m1:6c
You can copy the files to any folder.
scp id_rsa.pub root@targethost:~/.ssh/authorized_keys
Note: The target server must have the SSH server software installed.
To create a Network Scan policy that uses the key pair files
The Discovery Options page appears.
Specifies the port to communicate with the VMware server.
Default: 443
Specifies the port to communicate with the Microsoft System Center Virtual Machine Manager (SCVMM) server
Default: 8100
Specifies whether to discover network configuration settings.
Specifies whether to discover application configuration settings.
Specifies whether to discover servers and configuration settings of virtualized environments.
Specifies whether to discover hardware components.
Specifies whether to discover established network connections and open ports.
Select the checkbox, then click the Port Mapping to include or exclude specific ports during a network discovery.
Inclusions tab: In the left pane, double-click a mapped port to include it during a network scan.
Exclusions tab: In the left pane, double-click a mapped port to exclude it during a network scan.
Specifies the port that is used for the SSH communications.
Default: 22
Species one of the following modes: SSH with Credentials or SSH with Key File and Credentials. Select SSH with Key File and Credentials.
Specifies the user name that is used for the key file authentication.
Specifies the location and private key file to use for the SSH authentication. Enter the path to the private key file (id_rsa) on the NDG Server used by your CA Configuration Automation Server (step 6 in the previous procedure).
Specifies the location of public key file to use for the SSH authentication. Enter the path to the public key file (id_rsa.pub) on the NDG Server used by your CA Configuration Automation Server (step 6 in the previous procedure).
Specifies an optional key file protection passphrase. This passphrase must be associated with the key files when they are created (step 4 in the previous procedure). Leave this field blank if you did not create a passphrase.
If you click the Enable use of SSH Proxy check box, you can specify the following SSH Proxy options:
Specifies the name or IP address of the proxy server.
Specifies the listening port of the proxy server.
The policy is created and appears in the Network Scan Policies table.
Softagent data about the target servers is discovered and available in CA Configuration Automation.
|
Copyright © 2014 CA.
All rights reserved.
|
|