<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5506 outside access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5506-outside-access/m-p/3177299#M1066646</link>
    <description>&lt;P&gt;Yeah, removing the ICMP commands didn't help. I was discussing this with the other engineer and we are thinking that we didn't actually test the SSH so I'm guessing it never worked. They are using a PPPoE connection on their WAN, but I don't know if that would do anything....especially since I can see the packets arriving and getting dropped at the ASA. I'm still fairly new to the ASAs, but from what I've experienced, this should work. Perplexed!!&lt;/P&gt;</description>
    <pubDate>Tue, 29 Aug 2017 16:28:34 GMT</pubDate>
    <dc:creator>Ben F</dc:creator>
    <dc:date>2017-08-29T16:28:34Z</dc:date>
    <item>
      <title>ASA 5506 outside access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-outside-access/m-p/3176605#M1066639</link>
      <description>&lt;P&gt;Hello. Recently we installed a brand new ASA 5506 for a client. After the installation we were able to SSH into the device via the outside interface and the outside interface responded to pings. Now, the ASA will not respond and we cannot SSH to it. I did a capture and could see the pings reaching the ASA, but no reply was being sent. We had specific rules for what subnets could ping the interface, but during this changed it to "icmp permit any inside" and even added "icmp permit any echo outside" and "icmp permit any echo-reply outside"just to see if that made any difference. There are no other ACLs configured on the device. "Inspect ICMP" is also configured under the policy map. Users are still able to get to the internet and a "what's my ip" Google search shows the correct public IP. The only thing I haven't tried that I can think of is just a restart since that will require a scheduled downtime. Is there anything else that could be causing this?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:15:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-outside-access/m-p/3176605#M1066639</guid>
      <dc:creator>Ben F</dc:creator>
      <dc:date>2020-02-21T14:15:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 outside access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-outside-access/m-p/3176659#M1066640</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the current output ftom&lt;/P&gt;&lt;P&gt;&lt;I&gt;sh run ssh&lt;/I&gt;&lt;/P&gt;&lt;P&gt;and also&lt;/P&gt;&lt;P&gt;&lt;I&gt;sh run icmp&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;I&gt;&amp;nbsp;&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;&amp;nbsp;&lt;/I&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Aug 2017 17:20:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-outside-access/m-p/3176659#M1066640</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2017-08-28T17:20:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 outside access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-outside-access/m-p/3177214#M1066641</link>
      <description>&lt;P&gt;Hello! Luckily we have an agent on one of the client servers and I was able to SSH from inside. Here is the output for those commands. I removed our public IP addresses for obvious reasons. Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA# sh run ssh&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh &amp;lt;REMOVED_IP&amp;gt; 255.255.255.240 outside&lt;BR /&gt;ssh &amp;lt;REMOVED_IP&amp;gt; 255.255.255.224 outside&lt;BR /&gt;ssh &amp;lt;REMOVED_IP&amp;gt; 255.255.255.255 outside&lt;BR /&gt;ssh &amp;lt;REMOVED_IP&amp;gt; 255.255.255.255 outside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;ASA# sh run icmp&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any echo outside&lt;BR /&gt;icmp permit any echo-reply outside&lt;BR /&gt;ASA#&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2017 14:26:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-outside-access/m-p/3177214#M1066641</guid>
      <dc:creator>Ben F</dc:creator>
      <dc:date>2017-08-29T14:26:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 outside access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-outside-access/m-p/3177246#M1066642</link>
      <description>&lt;P&gt;Did a packet capture and can see the packets arriving...&lt;/P&gt;&lt;P&gt;ASA# capture TEST_ICMP type asp-drop all real-time detail trace&lt;BR /&gt;&lt;BR /&gt;Warning: using this option with a slow console connection may&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; result in an excessive amount of non-displayed packets&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; due to performance limitations.&lt;BR /&gt;&lt;BR /&gt;Use ctrl-c to terminate real-time capture&lt;BR /&gt;---cut---&lt;BR /&gt;&amp;nbsp; 16: 10:11:46.739234 0000.5e00.01&amp;lt;cut&amp;gt; &amp;lt;MAC_REMOVED&amp;gt; 0x0800 Length: 74&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;MyIP &amp;gt; &amp;lt;TargetIP&amp;gt;: icmp: echo request (ttl 110, id 17150) Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2017 15:13:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-outside-access/m-p/3177246#M1066642</guid>
      <dc:creator>Ben F</dc:creator>
      <dc:date>2017-08-29T15:13:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 outside access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-outside-access/m-p/3177255#M1066643</link>
      <description>&lt;P&gt;What is output from&lt;/P&gt;&lt;P&gt;show run access-group&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;show run access-list&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also - for SSH to the Outside Interface, have you enabled ssh debugging when attemtping to that specific interface?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2017 15:20:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-outside-access/m-p/3177255#M1066643</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2017-08-29T15:20:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 outside access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-outside-access/m-p/3177269#M1066644</link>
      <description>&lt;P&gt;Here is the command output. I will try the SSH debug next.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA# sh run access-group&lt;BR /&gt;ASA# sh run access-list&lt;BR /&gt;access-list SPLIT-TUNNEL standard permit 192.168.100.0 255.255.255.0&lt;BR /&gt;access-list ICMP_TEST standard permit host &amp;lt;MyIP&amp;gt;&lt;BR /&gt;ASA#&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2017 15:43:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-outside-access/m-p/3177269#M1066644</guid>
      <dc:creator>Ben F</dc:creator>
      <dc:date>2017-08-29T15:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 outside access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-outside-access/m-p/3177295#M1066645</link>
      <description>&lt;P&gt;The ICMP one is odd. My understanding is when you send icmp tarffic&amp;nbsp;direct to an ASA Interface (e.g not through the ASA) an Interface ACL plays no part at all on whether it is allowed/not allowed. It is specifically the icmp command that dictates what happens. I would remove all the ICMP permit commands you have for testing&amp;nbsp;- This then allows all ICMP traffic to the ASA on all Interfaces by default.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;no icmp permit any outside&lt;BR /&gt;no icmp permit any echo outside&lt;BR /&gt;no icmp permit any echo-reply outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would test ICMP from Outside your Network to the ASA Outside Interface&amp;nbsp;as well incase you are coming in via the Inside Interface first somehow (not sure on your topology so can only throw things out there). You did say it was working before though and nothing has changed. Maybe a reboot will help when you are able to do it. I have had many random ASA issues appear and solved by a reload &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2017 16:17:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-outside-access/m-p/3177295#M1066645</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2017-08-29T16:17:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 outside access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-outside-access/m-p/3177299#M1066646</link>
      <description>&lt;P&gt;Yeah, removing the ICMP commands didn't help. I was discussing this with the other engineer and we are thinking that we didn't actually test the SSH so I'm guessing it never worked. They are using a PPPoE connection on their WAN, but I don't know if that would do anything....especially since I can see the packets arriving and getting dropped at the ASA. I'm still fairly new to the ASAs, but from what I've experienced, this should work. Perplexed!!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2017 16:28:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-outside-access/m-p/3177299#M1066646</guid>
      <dc:creator>Ben F</dc:creator>
      <dc:date>2017-08-29T16:28:34Z</dc:date>
    </item>
  </channel>
</rss>

