https://github.com/serverfarmer/sm-inspect-routers
Tools for inspecting Cisco IOS and MikroTik RouterOS devices configuration.
https://github.com/serverfarmer/sm-inspect-routers
Last synced: 3 months ago
JSON representation
Tools for inspecting Cisco IOS and MikroTik RouterOS devices configuration.
- Host: GitHub
- URL: https://github.com/serverfarmer/sm-inspect-routers
- Owner: serverfarmer
- License: mit
- Created: 2018-10-20T11:20:35.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2021-11-28T10:37:58.000Z (over 3 years ago)
- Last Synced: 2025-01-22T17:13:29.766Z (5 months ago)
- Language: Shell
- Homepage: http://serverfarmer.org/
- Size: 4.41 MB
- Stars: 2
- Watchers: 2
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
### Overview
`sm-inspect-routers` management extension provides tools for inspecting device configuration of devices:
- Cisco IOS
- MikroTik RouterOS
- Ubiquiti UniFi Security Gateway#### Setting up passwordless ssh authentication on router
##### Cisco IOS:
https://supportforums.cisco.com/document/110946/ssh-using-public-key-authentication-ios-and-big-outputs
##### MikroTik RouterOS:
http://fajne.it/automatyzacja-backupu-routera-mikrotik.html - in polish language, short version below:
First, you need to generate ssh DSA (not RSA) key pair and install public key on all routers you plan to connect to.
```
ssh-keygen -t dsa -f ~/.serverfarmer/ssh/id_device_mikrotik
```Now, you have 2 files:
`~/.serverfarmer/ssh/id_device_mikrotik` is the private key, and you should protect it before any unauthorized access
`~/.serverfarmer/ssh/id_device_mikrotik.pub` is the public key, and you should install it on your routers:
```
scp -P 10022 ~/.serverfarmer/ssh/id_device_mikrotik.pub [email protected]:
```Then log in to your router using ssh (authenticating with password for the last time), and import the key to your user:
```
ssh -p 10022 [email protected]
[admin@router] > user ssh-keys import public-key-file=id_device_mikrotik.pub user=admin
```##### Ubiquiti UniFi Security Gateway:
Go to Settings page in UniFi control panel, Device Authentication section in the default tab:
- enable ssh access
- change user name to "admin" (default is probably "Admin")
- add your ssh RSA public key