- La colaboración entre Seguridad y FinOps puede generar beneficios ocultos en la nube
- El papel del CIO en 2024: una retrospectiva del año en clave TI
- How control rooms help organizations and security management
- ITDM 2025 전망 | “효율경영 시대의 핵심 동력 ‘데이터 조직’··· 내년도 활약 무대 더 커진다” 쏘카 김상우 본부장
- 세일포인트 기고 | 2025년을 맞이하며… 머신 아이덴티티의 부상이 울리는 경종
Access denied: Always check for protocol compatibility
While working on a base-wide network cutover at a military installation recently, I was verifying configurations on core, distribution, and access-node devices. Using a local host computer on the network, I was connected to the distribution node via an Ethernet port in a separate room and successfully pinged the node to verify network connectivity.
Then I tried to access the node using PuTTY via SSH (port 22), the recommended and secure method, and received this error message: “Network Error: Connection Refused. The network connection PuTTY tried to make to your device/server was rejected by the server.” This error usually happens because the server does not provide the service which PuTTY is trying to access.
I was working in the same building that the distribution node was in, so I went to it and consoled in using a serial cable. I wanted to verify that the device’s SSH ACL statement allowed my host to access the node via SSH. It did.
I checked to make sure the SSH version my computer was using for the PuTTY session matched the version installed on the node. It didn’t. My computer was using SSHv1; the node used SSHv2, so I had to install a new version of SSH.
Since I had to upgrade the software anyway, I took the opportunity to switch from PuTTY to SecureCRT, which has a friendlier user interface. And I made sure it supported SSHv2.
Lesson learned: Always check for protocol compatibility when making network connections.
Copyright © 2022 IDG Communications, Inc.