1 vote
Hi
I wanted to use the embedded SCP feature to up / download files to and from Cisco routers and switches.
However, all I get are empty navigation panes.
CRT / SecureFX can do it, I thought RDM can do it too, but I just cant get it to work.
Does anybody know any way to do this?
Thanks
Hi @markusvosen
Cisco devices are sometimes a little "non-standard" so we may have to fix something for it to work. I would need to clarify: are you having troubles with the SCP entry, or the SFTP entry, or the SFTP panel of the SSH Shell entry?
I would not be surprised if SCP does not work. I have much better confidence that SFTP would though.
Regards
Denis Vincent
Hi Denis
I tried various things, ranging from embedded SCP or SFTP (using the right-click and choosing SCP / SFTP), to creating new sessions (SCP / SFTP, both).
I have similar problems using winscp, so it definitely is something with the Cisco devices.
connecting via SSH is no problem at all and I have "ip scp server enable" configured on the routers.
But, on the other hand, via SecureFX, there is no problem seeing and transferring files.
And my train of thought is, if SecureCRT (-FX) can do it, so should RDM.
Maybe you can give me a hint how to troubleshoot this to give you more insight.
Thanks
BR
Markus
Ok, so let's focus on SCP and SFTP sessions then.
In both of those entries, there is the "Advanced" tab where you can set the option "Server type" to "Unix" instead of "Detect Automatically". This could help.
If not, then you should send me a log. For this, in the "Advanced" tab, enable "Show logs", set "Verbose" to 2, enable "Log to file" and set the path to where you want the log to be saved.
I would certainly prefer to make SFTP work rather than SCP, because SCP merely defines how files are transferred. Other operations, like listing, must rely on other protocols. Some SCP clients fall back on SFTP for this, which kind of defeats the purpose of using SCP in the first place. In RDM, we perform listing by executing either the "ls" or "dir" command. Even the file transfer is done by executing the "scp" command. Often, Cisco devices have a command syntax that differs from both Unix and Windows. And, some Cisco devices may not allow execution of commands directly in a non interactive SSH channel.
Lastly, if you could tell me which device models you are connecting to, this would help me narrow my search for supported protocols.
Regards
Denis Vincent
Hi Denis
Sorry it took so long to respond, but several projects forced me to put this on the backburner.
To answer your questions, I did check and uncheck all possible boxes, the result remains the same.
As far as SFTP is concerned, I tried this with all the switches, we are talking all kind of different 9000 series Catalyst switches (9300, 9407, 9500).
The switches can be configured for scp only ("ip scp server enable"), no sftp option available.
as for the log, the session seems to never really get to the switch, as I dont see the login syslog message and there is also no log created from RDM.
I have to add, that I use a linux jump host in between, which is set up as ssh gateway in the regular ssh session, which works without problems.
Also, to rule out that I have missed some developement in the past months, I updated to the latest version 2025.3.30.0
Hello,
Thank you for the additional information. I discussed with Denis and this is not just a fix that we need to do here. Currently, the SCP integration supports Unix and Windows commands, but Cisco switches have their own commands that we would need to support. Because of this, it would fall more in line with a feature request. I will move this thread to the appropriate forum section and we will open an internal ticket to add support for these Cisco switches.
Regards,
Hubert Mireault
Maybe this will help you, this is the verbose (sanitized) output of a successful session with SecureCRT.
Please note that I am going via a linux jump host aka ssh gateway (or in SecureCRT "firewall").
i SecureFX version 9.7.0.3761 (Official Release - 9. Dezember 2025) Serial Number 13-96-100699
i Session window 00002 established for session xxxx
i Attempting to connect to x.x.x.x
i Initializing Firewall[Session:y.y.y.y]: y.y.y.y:22
i SSH2Core version 9.7.0.3761
i Connecting to x.x.x.x:22 ...
i FIREWALL : SSH2Core version 9.7.0.3761
i FIREWALL : Connecting to y.y.y.y:22 ...
i FIREWALL : Changing state from STATE_NOT_CONNECTED to STATE_EXPECT_KEX_INIT
i FIREWALL : Using protocol SSH2
i FIREWALL : RECV : Remote Identifier = 'SSH-2.0-OpenSSH_8.0'
i FIREWALL : CAP : Remote can re-key
i FIREWALL : CAP : Remote sends language in password change requests
i FIREWALL : CAP : Remote sends error text in open failure packets
i FIREWALL : CAP : Remote sends name in service accept packets
i FIREWALL : CAP : Remote includes port number in x11 open packets
i FIREWALL : CAP : Remote uses 160 bit keys for SHA1 MAC
i FIREWALL : CAP : Remote supports new diffie-hellman group exchange messages
i FIREWALL : CAP : Remote correctly handles unknown SFTP extensions
i FIREWALL : CAP : Remote correctly sends UTF8 where UTF8 is specified
i FIREWALL : CAP : Remote correctly encodes OID for gssapi
i FIREWALL : CAP : Remote correctly uses connected addresses in forwarded-tcpip requests
i FIREWALL : CAP : Remote is IETF-DRAFT compliant
i FIREWALL : CAP : Remote can do SFTP version 4
i FIREWALL : CAP : Remote uses SHA1 hash in RSA signatures for x.509v3
i FIREWALL : CAP : Remote x.509v3 uses ASN.1 encoding for DSA signatures
i FIREWALL : CAP : Remote correctly handles zlib@openssh.com
i FIREWALL : CAP : Remote correctly reports server-sig-algs
i FIREWALL : SSPI : Requesting full delegation
i FIREWALL : SSPI : [Kerberos] SPN : host@y.y.y.y
i FIREWALL : SSPI : [Kerberos] InitializeSecurityContext() failed.
i FIREWALL : SSPI : [Kerberos] The specified target is unknown or unreachable
i FIREWALL : SSPI : [Kerberos] Disabling gss mechanism
i FIREWALL : GSS : Requesting full delegation
i FIREWALL : GSS : [Kerberos] SPN : host@y.y.y.y
i FIREWALL : GSS : [Kerberos] InitializeSecurityContext() failed.
i FIREWALL : GSS : [Kerberos] Could not load library 'gssapi64.dll': The specified module could not be found.
i FIREWALL : GSS : [Kerberos] Disabling gss mechanism
i FIREWALL : GSS : [Kerberos] Disabling gss mechanism
i FIREWALL : The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-group1-sha1-toxxx
i FIREWALL : SSPI : Requesting full delegation
i FIREWALL : SSPI : [Kerberos (Group Exchange)] SPN : host@y.y.y.y
i FIREWALL : SSPI : [Kerberos (Group Exchange)] InitializeSecurityContext() failed.
i FIREWALL : SSPI : [Kerberos (Group Exchange)] The specified target is unknown or unreachable
i FIREWALL : SSPI : [Kerberos (Group Exchange)] Disabling gss mechanism
i FIREWALL : GSS : Requesting full delegation
i FIREWALL : GSS : [Kerberos (Group Exchange)] SPN : host@y.y.y.y
i FIREWALL : GSS : [Kerberos (Group Exchange)] InitializeSecurityContext() failed.
i FIREWALL : GSS : [Kerberos (Group Exchange)] Could not load library 'gssapi64.dll': The specified module could not be found.
i FIREWALL : GSS : [Kerberos (Group Exchange)] Disabling gss mechanism
i FIREWALL : GSS : [Kerberos (Group Exchange)] Disabling gss mechanism
i FIREWALL : The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-gex-sha1-toWxxx
i FIREWALL : SEND : KEXINIT
i FIREWALL : SEARCH: C:\ProgramData\VanDyke\Known Hosts\
i FIREWALL : SEARCH: C:\Users\user\AppData\Roaming\VanDyke\Config\KnownHosts\
i FIREWALL : RECV : Read kexinit
i FIREWALL : Available Local Kex Methods = curve25519-sha256@libssh.org,curve25519-sha256,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256,diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,ext-info-c,kex-strict-c-v00@openssh.com
i FIREWALL : Available Remote Kex Methods = curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,kex-strict-s-v00@openssh.com
i FIREWALL : Selected Kex Method = curve25519-sha256@libssh.org
i FIREWALL : Available Local Host Key Algos = rsa-sha2-512,rsa-sha2-256,ssh-rsa,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-ed25519,x509v3-rsa2048-sha256,x509v3-ssh-rsa,x509v3-sign-rsa,x509v3-ssh-dss,x509v3-sign-dss,x509v3-ecdsa-sha2-nistp256,x509v3-ecdsa-sha2-nistp384,x509v3-ecdsa-sha2-nistp521,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss
i FIREWALL : Available Remote Host Key Algos = rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519
i FIREWALL : Selected Host Key Algo = rsa-sha2-512
i FIREWALL : Available Local Send Ciphers = chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,twofish-cbc
i FIREWALL : Available Remote Send Ciphers = aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes256-cbc,aes128-gcm@openssh.com,aes128-ctr,aes128-cbc
i FIREWALL : Selected Send Cipher = chacha20-poly1305@openssh.com
i FIREWALL : Available Local Recv Ciphers = chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,twofish-cbc
i FIREWALL : Available Remote Recv Ciphers = aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes256-cbc,aes128-gcm@openssh.com,aes128-ctr,aes128-cbc
i FIREWALL : Selected Recv Cipher = chacha20-poly1305@openssh.com
i FIREWALL : Available Local Send Macs = umac-128-etm@openssh.com,umac-64-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128@openssh.com,umac-64@openssh.com,hmac-sha2-512,hmac-sha2-256,hmac-sha1
i FIREWALL : Available Remote Send Macs = hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512
i FIREWALL : Selected Send Mac = poly1305
i FIREWALL : Available Local Recv Macs = umac-128-etm@openssh.com,umac-64-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128@openssh.com,umac-64@openssh.com,hmac-sha2-512,hmac-sha2-256,hmac-sha1
i FIREWALL : Available Remote Recv Macs = hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512
i FIREWALL : Selected Recv Mac = poly1305
i FIREWALL : Available Local Compressors = none
i FIREWALL : Available Remote Compressors = none,zlib@openssh.com
i FIREWALL : Selected Compressor = none
i FIREWALL : Available Local Decompressors = none
i FIREWALL : Available Remote Decompressors = none,zlib@openssh.com
i FIREWALL : Selected Decompressor = none
i FIREWALL : Changing state from STATE_EXPECT_KEX_INIT to STATE_KEY_EXCHANGE
i FIREWALL : SEND : SSH_MSG_KEX_ECDH_INIT
i FIREWALL : RECV : SSH_MSG_KEX_ECDH_REPLY
i FIREWALL : Changing state from STATE_KEY_EXCHANGE to STATE_READY_FOR_NEW_KEYS
i FIREWALL : RECV: Remote Hostkey ssh-rsa 3072 (SHA-2 hash hex): xxx
i FIREWALL : RECV: Remote Hostkey ssh-rsa 3072 (SHA-2 hash base64): xxx
i FIREWALL : RECV: Remote Hostkey ssh-rsa 3072 (SHA-1 hash): xxx
i FIREWALL : RECV: Remote Hostkey ssh-rsa 3072 (MD5 hash): xxx
i FIREWALL : SEARCH: 0 entries found for host
i FIREWALL : SEARCH: 1 entries found for host
i FIREWALL : SEARCH: hostkey was matched in database.
i FIREWALL : SEND : NEWKEYS
i FIREWALL : Changing state from STATE_READY_FOR_NEW_KEYS to STATE_EXPECT_NEWKEYS
i FIREWALL : RECV : NEWKEYS
i FIREWALL : Changing state from STATE_EXPECT_NEWKEYS to STATE_CONNECTION
i FIREWALL : SEND: SERVICE_REQUEST[ssh-userauth]
i FIREWALL : RECV : SSH_MSG_EXT_INFO
i FIREWALL : RECV : Extension name = server-sig-algs
i FIREWALL : RECV : Extension value = ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521
i FIREWALL : RECV: SERVICE_ACCEPT[ssh-userauth] -- OK
i FIREWALL : SENT : USERAUTH_REQUEST [none]
i FIREWALL : Authenticating as user login_user
i FIREWALL : RECV : USERAUTH_FAILURE, continuations [publickey,gssapi-keyex,gssapi-with-mic,password]
i FIREWALL : SENT : USERAUTH_REQUEST [password]
i FIREWALL : RECV : AUTH_SUCCESS
i FIREWALL : Starting port forward from 127.0.0.1 on local 127.0.0.1:56040 to remote x.x.x.x:22.
i Changing state from STATE_NOT_CONNECTED to STATE_EXPECT_KEX_INIT
i Using protocol SSH2
i RECV : Remote Identifier = 'SSH-2.0-Cisco-1.25'
i CAP : Remote can re-key
i CAP : Remote sends language in password change requests
i CAP : Remote sends error text in open failure packets
i CAP : Remote sends name in service accept packets
i CAP : Remote includes port number in x11 open packets
i CAP : Remote uses 160 bit keys for SHA1 MAC
i CAP : Remote supports new diffie-hellman group exchange messages
i CAP : Remote correctly handles unknown SFTP extensions
i CAP : Remote correctly encodes OID for gssapi
i CAP : Remote correctly uses connected addresses in forwarded-tcpip requests
i CAP : Remote can do SFTP version 4
i CAP : Remote uses SHA1 hash in RSA signatures for x.509v3
i CAP : Remote x.509v3 uses ASN.1 encoding for DSA signatures
i CAP : Remote correctly handles zlib@openssh.com
i CAP : Remote correctly reports server-sig-algs
i SSPI : Requesting full delegation
i SSPI : [Kerberos] SPN : host@x.x.x.x
i SSPI : [Kerberos] InitializeSecurityContext() failed.
i SSPI : [Kerberos] The specified target is unknown or unreachable
i SSPI : [Kerberos] Disabling gss mechanism
i GSS : Requesting full delegation
i GSS : [Kerberos] SPN : host@x.x.x.x
i GSS : [Kerberos] InitializeSecurityContext() failed.
i GSS : [Kerberos] Could not load library 'gssapi64.dll': The specified module could not be found.
i GSS : [Kerberos] Disabling gss mechanism
i GSS : [Kerberos] Disabling gss mechanism
i The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-group1-sha1-toWM5Slw5Ew8Mqkay+al2g==
i SSPI : Requesting full delegation
i SSPI : [Kerberos (Group Exchange)] SPN : host@x.x.x.x
i SSPI : [Kerberos (Group Exchange)] InitializeSecurityContext() failed.
i SSPI : [Kerberos (Group Exchange)] The specified target is unknown or unreachable
i SSPI : [Kerberos (Group Exchange)] Disabling gss mechanism
i GSS : Requesting full delegation
i GSS : [Kerberos (Group Exchange)] SPN : host@x.x.x.x
i GSS : [Kerberos (Group Exchange)] InitializeSecurityContext() failed.
i GSS : [Kerberos (Group Exchange)] Could not load library 'gssapi64.dll': The specified module could not be found.
i GSS : [Kerberos (Group Exchange)] Disabling gss mechanism
i GSS : [Kerberos (Group Exchange)] Disabling gss mechanism
i The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==
i SEND : KEXINIT
i SEARCH: C:\ProgramData\VanDyke\Known Hosts\
i SEARCH: C:\Users\user\AppData\Roaming\VanDyke\Config\KnownHosts\
i RECV : Read kexinit
i Available Local Kex Methods = curve25519-sha256@libssh.org,curve25519-sha256,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256,diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,ext-info-c,kex-strict-c-v00@openssh.com
i Available Remote Kex Methods = curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1
i Selected Kex Method = curve25519-sha256@libssh.org
i Available Local Host Key Algos = rsa-sha2-512,rsa-sha2-256,ssh-rsa,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-ed25519,x509v3-rsa2048-sha256,x509v3-ssh-rsa,x509v3-sign-rsa,x509v3-ssh-dss,x509v3-sign-dss,x509v3-ecdsa-sha2-nistp256,x509v3-ecdsa-sha2-nistp384,x509v3-ecdsa-sha2-nistp521,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss
i Available Remote Host Key Algos = rsa-sha2-512,rsa-sha2-256,ssh-rsa
i Selected Host Key Algo = rsa-sha2-512
i Available Local Send Ciphers = chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,twofish-cbc
i Available Remote Send Ciphers = chacha20-poly1305@openssh.com,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-gcm,aes256-gcm,aes128-ctr,aes192-ctr,aes256-ctr
i Selected Send Cipher = chacha20-poly1305@openssh.com
i Available Local Recv Ciphers = chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,twofish-cbc
i Available Remote Recv Ciphers = chacha20-poly1305@openssh.com,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-gcm,aes256-gcm,aes128-ctr,aes192-ctr,aes256-ctr
i Selected Recv Cipher = chacha20-poly1305@openssh.com
i Available Local Send Macs = umac-128-etm@openssh.com,umac-64-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128@openssh.com,umac-64@openssh.com,hmac-sha2-512,hmac-sha2-256,hmac-sha1
i Available Remote Send Macs = hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
i Selected Send Mac = poly1305
i Available Local Recv Macs = umac-128-etm@openssh.com,umac-64-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128@openssh.com,umac-64@openssh.com,hmac-sha2-512,hmac-sha2-256,hmac-sha1
i Available Remote Recv Macs = hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
i Selected Recv Mac = poly1305
i Available Local Compressors = none
i Available Remote Compressors = none
i Selected Compressor = none
i Available Local Decompressors = none
i Available Remote Decompressors = none
i Selected Decompressor = none
i Changing state from STATE_EXPECT_KEX_INIT to STATE_KEY_EXCHANGE
i SEND : SSH_MSG_KEX_ECDH_INIT
i RECV : SSH_MSG_KEX_ECDH_REPLY
i Changing state from STATE_KEY_EXCHANGE to STATE_READY_FOR_NEW_KEYS
i RECV: Remote Hostkey ssh-rsa 2048 (SHA-2 hash hex): xxx
i RECV: Remote Hostkey ssh-rsa 2048 (SHA-2 hash base64): jxxx
i RECV: Remote Hostkey ssh-rsa 2048 (SHA-1 hash): xxx
i RECV: Remote Hostkey ssh-rsa 2048 (MD5 hash): xxx
i SEARCH: 0 entries found for host
i SEARCH: 1 entries found for host
i SEARCH: hostkey was matched in database.
i SEND : NEWKEYS
i Changing state from STATE_READY_FOR_NEW_KEYS to STATE_EXPECT_NEWKEYS
i RECV : NEWKEYS
i Changing state from STATE_EXPECT_NEWKEYS to STATE_CONNECTION
i SEND: SERVICE_REQUEST[ssh-userauth]
i RECV: SERVICE_ACCEPT[ssh-userauth] -- OK
i SENT : USERAUTH_REQUEST [none]
i Authenticating as user login_user
i RECV : SSH_MSG_USERAUTH_BANNER
i
i
i ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
i ! !
i ! !
i ! This system is for the use of authorized users only. !
i ! Individuals using this computer system without authority, or in !
i ! excess of their authority, are subject to having all of their !
i ! activities on this system monitored and recorded by system !
i ! personnel. !
i ! !
i ! In the course of monitoring individuals improperly using this !
i ! system, or in the course of system maintenance, the activities !
i ! of authorized users may also be monitored. !
i ! !
i ! Anyone using this system expressly consents to such monitoring !
i ! and is advised that if such monitoring reveals possible !
i ! evidence of criminal activity, system personnel may provide the !
i ! evidence of such monitoring to law enforcement officials. !
i ! !
i ! Unauthorized access prohibited. !
i ! !
i ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
i
i RECV : USERAUTH_FAILURE, continuations [publickey,keyboard-interactive,password]
i SENT : USERAUTH_REQUEST [password]
i RECV : AUTH_SUCCESS
i SEND[0]: SSH_MSG_CHANNEL_OPEN('session')
i SEND[0]: Pty Request (term: vt100, rows: 1024, cols: 256)
i RECV[0]: pty request succeeded
i SEND[0]: shell request
i RECV[0]: shell request succeeded
i RECV[0]: switch line 3
i RECV[0]: +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
i RECV[0]: ! *** WARNING *** !
i RECV[0]: ! This unit is intended for restricted access, and is !
i RECV[0]: ! controlled by IT !
i RECV[0]: ! !
i RECV[0]: ! Use of this system constitutes your consent to monitoring. !
i RECV[0]: +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
i RECV[0]: You are now connected to
i RECV[0]: switch on 3
i RECV[0]: switch#
i SEND[0]: terminal length 0/
i RECV[0]: terminal length 0
i RECV[0]: switch#
i SEND[0]: enable/
i RECV[0]: enable
i RECV[0]: switch#
i SEND[0]: pwd/
i RECV[0]: pwd
i RECV[0]: bootflash:
i RECV[0]: switch#
i Resolved RealPath: bootflash:
i Remote operating system type is Cisco IOS/Juniper.
i SEND[0]: cd bootflash://
i RECV[0]: cd bootflash:/
i RECV[0]: switch#
i SEND[0]: pwd/
i RECV[0]: pwd
i RECV[0]: bootflash:/
i RECV[0]: switch#
i Resolved RealPath: bootflash:/
i SEND[0]: cd bootflash://
i RECV[0]: cd bootflash:/
i RECV[0]: switch#
i Opened directory: bootflash:/
i SEND[0]: cd bootflash://
i RECV[0]: cd bootflash:/
i RECV[0]: switch#
i SEND[0]: dir bootflash://
i RECV[0]: dir bootflash:/
i RECV[0]: Directory of bootflash:/
Thanks for the log, I have made a quick check, and it looks like there is useful informations in it.
Regards
Denis Vincent
Hi
Just wanted to check about the status?
Were you able to get some idea how to move forward from the SecureCRT output?
Thanks
Hi,
I haven't begun development on this feature yet. We are planning to try having it in the 2026.2 version later this summer. Keep in mind this is not like a simple bug fix, it is a whole new feature which must be added carefully to not break what is already working. The SecureCRT output that you provided will most probably be useful, it's already sure it will help me select the correct Cisco OS to support, because not all Cisco devices have the same command syntax.
Regards.
Denis Vincent