<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Did you try to reset the SSH in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/asa5500-ssh-using-aaa-radius/m-p/3008598#M23964</link>
    <description>&lt;P&gt;Did you try to reset the SSH keys on ASA.&lt;/P&gt;
&lt;P&gt;Also what error on radius server is coming in authentication report.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Gagan&lt;/P&gt;</description>
    <pubDate>Sat, 18 Feb 2017 19:36:39 GMT</pubDate>
    <dc:creator>Gagandeep Singh</dc:creator>
    <dc:date>2017-02-18T19:36:39Z</dc:date>
    <item>
      <title>ASA5500 SSH using AAA RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/asa5500-ssh-using-aaa-radius/m-p/3008595#M23957</link>
      <description>&lt;P&gt;Hello - having issues getting SSH to authenticate properly on a Cisco ASA 5500. Below are the respective configs and debug outputs. Any help is appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;///ASA CONFIG&lt;/P&gt;
&lt;P&gt;# sh run aaa&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;BR /&gt;aaa authentication enable console RADIUS LOCAL&lt;BR /&gt;aaa authentication ssh console RADIUS&lt;BR /&gt;aaa authorization exec LOCAL auto-enable&lt;/P&gt;
&lt;P&gt;# sh run ssh&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh xx.xx.xx.xx 255.0.0.0 inside&lt;BR /&gt;ssh xx.xx.xx.xx 255.255.255.255 outside&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;
&lt;P&gt;# sh run aaa-server&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;&amp;nbsp;reactivation-mode depletion deadtime 5&lt;BR /&gt;aaa-server RADIUS (inside) host xx.xx.xx.xx&lt;BR /&gt;&amp;nbsp;retry-interval 7&lt;BR /&gt;&amp;nbsp;timeout 9&lt;BR /&gt;&amp;nbsp;key *****&lt;BR /&gt;&amp;nbsp;acl-netmask-convert wildcard&lt;BR /&gt;aaa-server RADIUS (inside) host xx.xx.xx.xx&lt;BR /&gt;&amp;nbsp;retry-interval 7&lt;BR /&gt;&amp;nbsp;timeout 9&lt;BR /&gt;&amp;nbsp;key *****&lt;BR /&gt;&amp;nbsp;acl-netmask-convert wildcard&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;# test aaa-server authentication RADIUS&lt;BR /&gt;Server IP Address or name: xx.xx.xx.xx&lt;BR /&gt;Username: USERNAME&lt;BR /&gt;Password: **********&lt;BR /&gt;INFO: Attempting Authentication test to IP address &amp;lt;xx.xx.xx.xx&amp;gt; (timeout: 11 seconds)&lt;BR /&gt;&lt;STRONG&gt;INFO: Authentication Successful&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Testing authentication from ASA to RADIUS server is successful for same UN/PW using from shell.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;////SSH DEBUG&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;# Device ssh opened successfully.&lt;BR /&gt;SSH0: SSH client: IP = ‘xx.xx.xx.xx’&amp;nbsp; interface # = 2&lt;BR /&gt;SSH: host key initialised&lt;BR /&gt;SSH0: starting SSH control process&lt;BR /&gt;SSH0: Exchanging versions - SSH-1.99-Cisco-1.25&lt;BR /&gt;&lt;BR /&gt;SSH0: send SSH message: outdata is NULL&lt;BR /&gt;&lt;BR /&gt;server version string:SSH-1.99-Cisco-1.25&lt;BR /&gt;SSH0: receive SSH message: 83 (83)&lt;BR /&gt;SSH0: client version is - SSH-2.0-OpenSSH_6.2&lt;BR /&gt;&lt;BR /&gt;client version string:SSH-2.0-OpenSSH_6.2&lt;BR /&gt;&lt;BR /&gt;SSH2 0: send: len 304 (includes padlen 6)&lt;BR /&gt;SSH2 0: SSH2_MSG_KEXINIT sent&lt;BR /&gt;SSH2 0: ssh_receive: 1380 bytes received&lt;BR /&gt;SSH2 0: input: packet len 1592&lt;BR /&gt;SSH2 0: partial packet 8, need 1584, maclen 0&lt;BR /&gt;SSH2 0: ssh_receive: 212 bytes received&lt;BR /&gt;SSH2 0: partial packet 8, need 1584, maclen 0&lt;BR /&gt;SSH2 0: input: padlen 6&lt;BR /&gt;SSH2 0: received packet type 20&lt;BR /&gt;&lt;BR /&gt;SSH2 0: SSH2_MSG_KEXINIT received&lt;BR /&gt;SSH2: kex: client-&amp;gt;server aes128-ctr hmac-md5 none&lt;BR /&gt;SSH2: kex: server-&amp;gt;client aes128-ctr hmac-md5 none&lt;BR /&gt;SSH2 0: expecting SSH2_MSG_KEXDH_INIT&lt;BR /&gt;SSH2 0: ssh_receive: 144 bytes received&lt;BR /&gt;SSH2 0: input: packet len 144&lt;BR /&gt;SSH2 0: partial packet 8, need 136, maclen 0&lt;BR /&gt;SSH2 0: input: padlen 6&lt;BR /&gt;SSH2 0: received packet type 30&lt;BR /&gt;&lt;BR /&gt;SSH2 0: SSH2_MSG_KEXDH_INIT received&lt;BR /&gt;SSH2 0: signature length 143&lt;BR /&gt;SSH2 0: send: len 448 (includes padlen 7)&lt;BR /&gt;SSH2: kex_derive_keys complete&lt;BR /&gt;SSH2 0: send: len 16 (includes padlen 10)&lt;BR /&gt;SSH2 0: newkeys: mode 1&lt;BR /&gt;SSH2 0: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;SSH2 0: waiting for SSH2_MSG_NEWKEYS&lt;BR /&gt;SSH2 0: ssh_receive: 16 bytes received&lt;BR /&gt;SSH2 0: input: packet len 16&lt;BR /&gt;SSH2 0: partial packet 8, need 8, maclen 0&lt;BR /&gt;SSH2 0: input: padlen 10&lt;BR /&gt;SSH2 0: newkeys: mode 0&lt;BR /&gt;SSH2 0: received packet type 21&lt;BR /&gt;&lt;BR /&gt;SSH2 0: SSH2_MSG_NEWKEYS received&lt;BR /&gt;SSH2 0: ssh_receive: 48 bytes received&lt;BR /&gt;SSH2 0: input: packet len 32&lt;BR /&gt;SSH2 0: partial packet 16, need 16, maclen 16&lt;BR /&gt;SSH2 0: MAC #3 ok&lt;BR /&gt;SSH2 0: input: padlen 10&lt;BR /&gt;SSH2 0: received packet type 5&lt;BR /&gt;&lt;BR /&gt;SSH2 0: send: len 32 (includes padlen 10)&lt;BR /&gt;SSH2 0: done calc MAC out #3&lt;BR /&gt;SSH2 0: ssh_receive: 64 bytes received&lt;BR /&gt;SSH2 0: input: packet len 48&lt;BR /&gt;SSH2 0: partial packet 16, need 32, maclen 16&lt;BR /&gt;SSH2 0: MAC #4 ok&lt;BR /&gt;SSH2 0: input: padlen 5&lt;BR /&gt;SSH2 0: received packet type 50&lt;BR /&gt;SSH(USERNAME): user authen method is 'use AAA', aaa server group ID = 4&lt;BR /&gt;&lt;BR /&gt;SSH2 0: send: len 48 (includes padlen 19)&lt;BR /&gt;SSH2 0: done calc MAC out #4&lt;BR /&gt;SSH2 0: ssh_receive: 624 bytes received&lt;BR /&gt;SSH2 0: input: packet len 608&lt;BR /&gt;SSH2 0: partial packet 16, need 592, maclen 16&lt;BR /&gt;SSH2 0: MAC #5 ok&lt;BR /&gt;SSH2 0: input: padlen 9&lt;BR /&gt;SSH2 0: received packet type 50&lt;BR /&gt;SSH(USERNAME): user authen method is 'use AAA', aaa server group ID = 4&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;SSH2 0: Bad username&amp;nbsp; ///Not sure why I'm getting bad username here&lt;/STRONG&gt;&lt;BR /&gt;SSH2 0: send: len 48 (includes padlen 19)&lt;BR /&gt;SSH2 0: done calc MAC out #5&lt;BR /&gt;SSH2 0: ssh_receive: 144 bytes received&lt;BR /&gt;SSH2 0: input: packet len 128&lt;BR /&gt;SSH2 0: partial packet 16, need 112, maclen 16&lt;BR /&gt;SSH2 0: MAC #6 ok&lt;BR /&gt;SSH2 0: input: padlen 66&lt;BR /&gt;SSH2 0: received packet type 50&lt;BR /&gt;SSH(USERNAME): user authen method is 'use AAA', aaa server group ID = 4&lt;BR /&gt;&lt;BR /&gt;SSH2 0: send: len 48 (includes padlen 19)&lt;BR /&gt;SSH2 0: done calc MAC out #6&lt;BR /&gt;SSH2 0: authentication failed for USERNAME&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm going to verify the RADIUS server is configured properly, however I don't think this is the case since the ASA&amp;gt;RADIUS auth tests fine, it is only by SSH does it fail.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:28:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa5500-ssh-using-aaa-radius/m-p/3008595#M23957</guid>
      <dc:creator>Paul</dc:creator>
      <dc:date>2019-03-11T07:28:02Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/asa5500-ssh-using-aaa-radius/m-p/3008596#M23958</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Few questions:&lt;/P&gt;
&lt;P&gt;1) Is there any specific reason of &amp;nbsp;having "&lt;SPAN&gt;&amp;nbsp;acl-netmask-convert wildcard" in radius server definition.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2) Try to change shared key on both ASA and TACACS.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;3) What error you get on server when try to do SSH on ASA.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Gagan&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2017 03:01:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa5500-ssh-using-aaa-radius/m-p/3008596#M23958</guid>
      <dc:creator>Gagandeep Singh</dc:creator>
      <dc:date>2017-02-17T03:01:01Z</dc:date>
    </item>
    <item>
      <title>Hi Gagan,</title>
      <link>https://community.cisco.com/t5/network-access-control/asa5500-ssh-using-aaa-radius/m-p/3008597#M23961</link>
      <description>&lt;P&gt;Hi Gagan,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;No reason for the for netmask-convert, removing this command does not change the behavior.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;prompt from ssh console:&lt;/P&gt;
&lt;P&gt;Permission denied, please try again.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;When testing authentication from the ASA to RADIUS server, is the key not transferred in this process? I would think it is.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2017 17:37:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa5500-ssh-using-aaa-radius/m-p/3008597#M23961</guid>
      <dc:creator>Paul</dc:creator>
      <dc:date>2017-02-17T17:37:38Z</dc:date>
    </item>
    <item>
      <title>Did you try to reset the SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/asa5500-ssh-using-aaa-radius/m-p/3008598#M23964</link>
      <description>&lt;P&gt;Did you try to reset the SSH keys on ASA.&lt;/P&gt;
&lt;P&gt;Also what error on radius server is coming in authentication report.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Gagan&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2017 19:36:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa5500-ssh-using-aaa-radius/m-p/3008598#M23964</guid>
      <dc:creator>Gagandeep Singh</dc:creator>
      <dc:date>2017-02-18T19:36:39Z</dc:date>
    </item>
    <item>
      <title>After much troubleshooting,</title>
      <link>https://community.cisco.com/t5/network-access-control/asa5500-ssh-using-aaa-radius/m-p/3008599#M23965</link>
      <description>&lt;P&gt;After much troubleshooting, we've finally got this to work. For whatever reason I added&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ssh scopy enable&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;to the ssh config on the ASA and it started accepting the connections and elevating correctly. I still don't understand why this command helped?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2017 18:41:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa5500-ssh-using-aaa-radius/m-p/3008599#M23965</guid>
      <dc:creator>Paul</dc:creator>
      <dc:date>2017-03-15T18:41:15Z</dc:date>
    </item>
    <item>
      <title>do you have the logs on the</title>
      <link>https://community.cisco.com/t5/network-access-control/asa5500-ssh-using-aaa-radius/m-p/3008600#M23968</link>
      <description>&lt;P&gt;do you have the logs on the RADIUS server?&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2017 05:32:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa5500-ssh-using-aaa-radius/m-p/3008600#M23968</guid>
      <dc:creator>Angel Castillo</dc:creator>
      <dc:date>2017-03-17T05:32:23Z</dc:date>
    </item>
  </channel>
</rss>

