<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA ssh not connecting with cipher error in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4052166#M1068220</link>
    <description>&lt;P&gt;ASDM and https are still not connecting buy SSH is now working. Thanks for the fix to SSH. Do you know why ASDM and https would still be failing?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;smc-asa# sh ver | i 3DES&lt;BR /&gt;Encryption-3DES-AES : Disabled perpetual&lt;/P&gt;&lt;P&gt;I was able to submit a request for a license key from:&lt;/P&gt;&lt;P&gt;&lt;A href="https://slexui.cloudapps.cisco.com/SWIFT/LicensingUI/Quickstart#" target="_blank"&gt;https://slexui.cloudapps.cisco.com/SWIFT/LicensingUI/Quickstart#&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I received the key in an email and applied it on the ASA&lt;/P&gt;&lt;P&gt;smc-asa(config)# activation-key 00000000 00000000 00000000 00000000 00000000&lt;/P&gt;&lt;P&gt;Validating activation key. This may take a few minutes...&lt;BR /&gt;Failed to retrieve permanent activation key.&lt;BR /&gt;Both Running and Flash permanent activation key was updated with the requested key.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;smc-asa(config)# sh ver | i 3DES&lt;BR /&gt;Encryption-3DES-AES : Enabled perpetual&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 25 Mar 2020 15:26:20 GMT</pubDate>
    <dc:creator>DavidM0567</dc:creator>
    <dc:date>2020-03-25T15:26:20Z</dc:date>
    <item>
      <title>Cisco ASA ssh not connecting with cipher error</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4051419#M1068150</link>
      <description>&lt;P&gt;I am unable connect to the Cisco ASA 5512-X with ssh or asdm. I can telnet to it. This issue occurred following wiping the configuration to clear a password when password recovery was disabled. Debug shows "cipher not supported" but it is listed as a cipher in "sh ssh ciphers".&amp;nbsp; Does anyone know what I can do to fix ssh and asdm?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;smc-asa# sh ver&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.12(3)9&lt;BR /&gt;SSP Operating System Version 2.6(1.192)&lt;BR /&gt;Device Manager Version 7.13(1)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;smc-asa(config)#&amp;nbsp;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;smc-asa(config)# ssh version 2&lt;BR /&gt;smc-asa(config)# ssh key-exchange group dh-group14-sha1&lt;BR /&gt;smc-asa(config)# crypto key generate rsa modulus 2048&lt;BR /&gt;WARNING: You have a RSA keypair already defined named &amp;lt;Default-RSA-Key&amp;gt;.&lt;/P&gt;&lt;P&gt;Do you really want to replace them? [yes/no]: yes&lt;BR /&gt;Keypair generation process begin. Please wait...&lt;BR /&gt;smc-asa(config)# Device ssh opened successfully.&lt;BR /&gt;SSH0: SSH client: IP = '172.16.87.2' interface # = 2&lt;BR /&gt;SSH: host key initialised&lt;BR /&gt;SSH0: starting SSH control process&lt;BR /&gt;SSH0: Exchanging versions - SSH-2.0-Cisco-1.25&lt;/P&gt;&lt;P&gt;SSH0: send SSH message: outdata is NULL&lt;/P&gt;&lt;P&gt;server version string:SSH-2.0-Cisco-1.25&lt;BR /&gt;SSH0: receive SSH message: 83 (83)&lt;BR /&gt;SSH0: client version is - SSH-2.0-PuTTY_Release_0.66&lt;/P&gt;&lt;P&gt;client version string:SSH-2.0-PuTTY_Release_0.66&lt;/P&gt;&lt;P&gt;SSH2 0: send: len 360 (includes padlen 7)&lt;BR /&gt;SSH2 0: SSH2_MSG_KEXINIT sent&lt;BR /&gt;SSH2 0: input: packet len 672&lt;BR /&gt;SSH2 0: partial packet 8, need 664, maclen 0&lt;BR /&gt;SSH2 0: ssh_receive: 204 bytes received&lt;BR /&gt;SSH2 0: partial packet 8, need 664, maclen 0&lt;BR /&gt;SSH2 0: input: padlen 10&lt;BR /&gt;SSH2 0: received packet type 20&lt;/P&gt;&lt;P&gt;SSH2 0: SSH2_MSG_KEXINIT received&lt;BR /&gt;SSH2 0: matching cipher is not supported: aes256-ctr&lt;BR /&gt;SSH2 0: ssh: kex_choose_conf error&lt;BR /&gt;SSH2 0: key exchange failed to completeSSH0: Session disconnected by SSH server - error 0x00 "Internal error"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;smc-asa# sh ssh ciphers&lt;BR /&gt;Available SSH Encryption and Integrity Algorithms&lt;BR /&gt;Encryption Algorithms:&lt;BR /&gt;all: 3des-cbc aes128-cbc aes192-cbc aes256-cbc aes128-ctr aes192-ctr aes256-ctr&lt;BR /&gt;low: 3des-cbc aes128-cbc aes192-cbc aes256-cbc aes128-ctr aes192-ctr aes256-ctr&lt;BR /&gt;medium: aes128-cbc aes192-cbc aes256-cbc aes128-ctr aes192-ctr aes256-ctr&lt;BR /&gt;fips: aes128-cbc aes256-cbc&lt;BR /&gt;high: aes256-cbc aes256-ctr&lt;BR /&gt;Integrity Algorithms:&lt;BR /&gt;all: hmac-sha1 hmac-sha1-96 hmac-md5 hmac-md5-96 hmac-sha2-256&lt;BR /&gt;low: hmac-sha1 hmac-sha1-96 hmac-md5 hmac-md5-96 hmac-sha2-256&lt;BR /&gt;medium: hmac-sha1 hmac-sha1-96 hmac-sha2-256&lt;BR /&gt;fips: hmac-sha1 hmac-sha2-256&lt;BR /&gt;high: hmac-sha2-256&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 17:21:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4051419#M1068150</guid>
      <dc:creator>DavidM0567</dc:creator>
      <dc:date>2020-03-24T17:21:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA ssh not connecting with cipher error</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4051776#M1068176</link>
      <description>&lt;P&gt;I've seen people using an old Putty client version that doesn't support the DH Group 14 and other settings. According to your debugs the client that's failing is using Putty 0.66 (from 2015). Can you update the Putty and check?&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 03:53:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4051776#M1068176</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-03-25T03:53:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA ssh not connecting with cipher error</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4052090#M1068207</link>
      <description>&lt;P&gt;I upgraded to the latest putty version (0.73) but I was still unable to connect. I am also unable to connect with ASDM or access the web interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTTPS in Chrome to the ASA IP gives the message:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This site can’t provide a secure connection 172.16.1.1 uses an unsupported protocol.&lt;BR /&gt;ERR_SSL_VERSION_OR_CIPHER_MISMATCH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;smc-asa# debug ssh&lt;BR /&gt;debug ssh enabled at level 1&lt;BR /&gt;smc-asa# Device ssh opened successfully.&lt;BR /&gt;SSH0: SSH client: IP = '172.16.87.2' interface # = 2&lt;BR /&gt;SSH: host key initialised&lt;BR /&gt;SSH0: starting SSH control process&lt;BR /&gt;SSH0: Exchanging versions - SSH-2.0-Cisco-1.25&lt;/P&gt;&lt;P&gt;SSH0: send SSH message: outdata is NULL&lt;/P&gt;&lt;P&gt;server version string:SSH-2.0-Cisco-1.25&lt;BR /&gt;SSH0: receive SSH message: 83 (83)&lt;BR /&gt;SSH0: client version is - SSH-2.0-PuTTY_Release_0.73&lt;/P&gt;&lt;P&gt;client version string:SSH-2.0-PuTTY_Release_0.73&lt;/P&gt;&lt;P&gt;SSH2 0: SSH2_MSG_KEXINIT sent&lt;BR /&gt;SSH2 0: SSH2_MSG_KEXINIT received&lt;BR /&gt;SSH2 0: matching cipher is not supported: aes256-ctr&lt;BR /&gt;SSH2 0: ssh: kex_choose_conf error&lt;BR /&gt;SSH2 0: key exchange failed to completeSSH0: Session disconnected by SSH server - error 0x00 "Internal error"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 14:08:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4052090#M1068207</guid>
      <dc:creator>DavidM0567</dc:creator>
      <dc:date>2020-03-25T14:08:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA ssh not connecting with cipher error</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4052113#M1068212</link>
      <description>&lt;P&gt;Check that your wipe didn't also clear your 3DES-AES license on the ASA:&lt;/P&gt;
&lt;PRE&gt;show version | i 3DES&lt;/PRE&gt;
&lt;P&gt;If it's not active, then go to software.cisco.com and request a new (free) 3DES-AES license from the traditional licenses section.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 14:26:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4052113#M1068212</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-03-25T14:26:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA ssh not connecting with cipher error</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4052166#M1068220</link>
      <description>&lt;P&gt;ASDM and https are still not connecting buy SSH is now working. Thanks for the fix to SSH. Do you know why ASDM and https would still be failing?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;smc-asa# sh ver | i 3DES&lt;BR /&gt;Encryption-3DES-AES : Disabled perpetual&lt;/P&gt;&lt;P&gt;I was able to submit a request for a license key from:&lt;/P&gt;&lt;P&gt;&lt;A href="https://slexui.cloudapps.cisco.com/SWIFT/LicensingUI/Quickstart#" target="_blank"&gt;https://slexui.cloudapps.cisco.com/SWIFT/LicensingUI/Quickstart#&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I received the key in an email and applied it on the ASA&lt;/P&gt;&lt;P&gt;smc-asa(config)# activation-key 00000000 00000000 00000000 00000000 00000000&lt;/P&gt;&lt;P&gt;Validating activation key. This may take a few minutes...&lt;BR /&gt;Failed to retrieve permanent activation key.&lt;BR /&gt;Both Running and Flash permanent activation key was updated with the requested key.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;smc-asa(config)# sh ver | i 3DES&lt;BR /&gt;Encryption-3DES-AES : Enabled perpetual&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 15:26:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4052166#M1068220</guid>
      <dc:creator>DavidM0567</dc:creator>
      <dc:date>2020-03-25T15:26:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA ssh not connecting with cipher error</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4052232#M1068225</link>
      <description>&lt;P&gt;ASDM and https depend on having several things in addition to the 3DES-AES license:&lt;/P&gt;
&lt;P&gt;1. a valid ASDM image on disk0&lt;/P&gt;
&lt;P&gt;2. an "asdm image" statement in the config referring to the image&lt;/P&gt;
&lt;P&gt;3. http server enabled (it's actually TLS but the http command is there from decades ago)&lt;/P&gt;
&lt;P&gt;4. http being explicitly allowed on the interface that the traffic arrives with the address or network of the client allowed.&lt;/P&gt;
&lt;P&gt;The following commands will confirm those:&lt;/P&gt;
&lt;PRE&gt;dir disk0:
show run asdm
show run http&lt;/PRE&gt;</description>
      <pubDate>Wed, 25 Mar 2020 16:32:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4052232#M1068225</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-03-25T16:32:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA ssh not connecting with cipher error</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4052263#M1068227</link>
      <description>&lt;P&gt;I've confirmed the asdm file is on disk0: and that the asdm image is mapped to it. I've tried different version of asdm but receive the same results. http is enable for all IPs on the inside interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The https connection gives an error:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This site can’t provide a secure connection172.16.1.1 uses an unsupported protocol.&lt;BR /&gt;ERR_SSL_VERSION_OR_CIPHER_MISMATCH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;smc-asa# sh disk0:&lt;BR /&gt;--#-- --length-- -----date/time------ path&lt;BR /&gt;42 103071744 Mar 23 2020 13:44:56 asa9-12-3-9-smp-k8.bin&lt;BR /&gt;43 34033084 Mar 23 2020 13:46:08 asdm-7131.bin&lt;BR /&gt;46 82593792 Mar 24 2020 10:46:59 asa952-smp-k8.bin&lt;BR /&gt;48 111624192 Mar 24 2020 11:03:34 asa984-17-smp-k8.bin&lt;BR /&gt;54 32738244 Mar 25 2020 12:59:07 asdm-792-152.bin&lt;/P&gt;&lt;P&gt;4118085632 bytes total (3753959424 bytes free)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;smc-asa# sh run asdm&lt;BR /&gt;asdm image disk0:/asdm-792-152.bin&lt;BR /&gt;asdm history enable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;smc-asa# sh run http&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 17:06:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4052263#M1068227</guid>
      <dc:creator>DavidM0567</dc:creator>
      <dc:date>2020-03-25T17:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA ssh not connecting with cipher error</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4052631#M1068246</link>
      <description>&lt;P&gt;Can you run wireshark while trying to connect via https? Capture filter on the ASA address and then display filter on tcp.port==443.&lt;/P&gt;
&lt;P&gt;You should see a cipher spec exchange and which side is not working will be confirmed.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2020 06:20:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4052631#M1068246</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-03-26T06:20:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA ssh not connecting with cipher error</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4052932#M1068281</link>
      <description>&lt;P&gt;There was a "client hello" followed by this message. I didn't see anything that mentioned&amp;nbsp;&lt;SPAN&gt;cipher spec exchange specifically. Is this the message you expected to see? It's using&amp;nbsp;TLS 1.2. Is there something more that I should be getting from this message?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;311 3.425332 172.16.87.10 172.16.84.188 TLSv1.2 61 Alert (Level: Fatal, Description: Handshake Failure)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Frame 311: 61 bytes on wire (488 bits), 61 bytes captured (488 bits) on interface \Device\NPF_{D1A3B5DD-3207-4036-BB7A-8D425BB0DF6B}, id 0&lt;BR /&gt;Interface id: 0 (\Device\NPF_{D1A3B5DD-3207-4036-BB7A-8D425BB0DF6B})&lt;BR /&gt;Encapsulation type: Ethernet (1)&lt;BR /&gt;Arrival Time: Mar 26, 2020 10:39:56.044911000 Eastern Daylight Time&lt;BR /&gt;[Time shift for this packet: 0.000000000 seconds]&lt;BR /&gt;Epoch Time: 1585233596.044911000 seconds&lt;BR /&gt;[Time delta from previous captured frame: 0.000287000 seconds]&lt;BR /&gt;[Time delta from previous displayed frame: 0.000287000 seconds]&lt;BR /&gt;[Time since reference or first frame: 3.425332000 seconds]&lt;BR /&gt;Frame Number: 311&lt;BR /&gt;Frame Length: 61 bytes (488 bits)&lt;BR /&gt;Capture Length: 61 bytes (488 bits)&lt;BR /&gt;[Frame is marked: False]&lt;BR /&gt;[Frame is ignored: False]&lt;BR /&gt;[Protocols in frame: eth:ethertype:ip:tcp:tls]&lt;BR /&gt;[Coloring Rule Name: TCP]&lt;BR /&gt;[Coloring Rule String: tcp]&lt;BR /&gt;Ethernet II, Src: Cisco_b7:3e:40 (50:87:89:b7:3e:40), Dst: VMware_d5:79:73 (00:0c:29:d5:79:73)&lt;BR /&gt;Destination: VMware_d5:79:73 (00:0c:29:d5:79:73)&lt;BR /&gt;Source: Cisco_b7:3e:40 (50:87:89:b7:3e:40)&lt;BR /&gt;Type: IPv4 (0x0800)&lt;BR /&gt;Internet Protocol Version 4, Src: 172.16.87.10, Dst: 172.16.84.188&lt;BR /&gt;0100 .... = Version: 4&lt;BR /&gt;.... 0101 = Header Length: 20 bytes (5)&lt;BR /&gt;Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)&lt;BR /&gt;Total Length: 47&lt;BR /&gt;Identification: 0x80e9 (33001)&lt;BR /&gt;Flags: 0x0000&lt;BR /&gt;Fragment offset: 0&lt;BR /&gt;Time to live: 255&lt;BR /&gt;Protocol: TCP (6)&lt;BR /&gt;Header checksum: 0x36f8 [validation disabled]&lt;BR /&gt;[Header checksum status: Unverified]&lt;BR /&gt;Source: 172.16.87.10&lt;BR /&gt;Destination: 172.16.84.188&lt;BR /&gt;Transmission Control Protocol, Src Port: 443, Dst Port: 60255, Seq: 1, Ack: 518, Len: 7&lt;BR /&gt;Source Port: 443&lt;BR /&gt;Destination Port: 60255&lt;BR /&gt;[Stream index: 2]&lt;BR /&gt;[TCP Segment Len: 7]&lt;BR /&gt;Sequence number: 1 (relative sequence number)&lt;BR /&gt;Sequence number (raw): 1409711058&lt;BR /&gt;[Next sequence number: 8 (relative sequence number)]&lt;BR /&gt;Acknowledgment number: 518 (relative ack number)&lt;BR /&gt;Acknowledgment number (raw): 3705980144&lt;BR /&gt;0101 .... = Header Length: 20 bytes (5)&lt;BR /&gt;Flags: 0x018 (PSH, ACK)&lt;BR /&gt;Window size value: 32768&lt;BR /&gt;[Calculated window size: 32768]&lt;BR /&gt;[Window size scaling factor: -2 (no window scaling used)]&lt;BR /&gt;Checksum: 0x8b0f [unverified]&lt;BR /&gt;[Checksum Status: Unverified]&lt;BR /&gt;Urgent pointer: 0&lt;BR /&gt;[SEQ/ACK analysis]&lt;BR /&gt;[Timestamps]&lt;BR /&gt;TCP payload (7 bytes)&lt;BR /&gt;Transport Layer Security&lt;BR /&gt;TLSv1.2 Record Layer: Alert (Level: Fatal, Description: Handshake Failure)&lt;BR /&gt;Content Type: Alert (21)&lt;BR /&gt;Version: TLS 1.2 (0x0303)&lt;BR /&gt;Length: 2&lt;BR /&gt;Alert Message&lt;BR /&gt;Level: Fatal (2)&lt;BR /&gt;Description: Handshake Failure (40)&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2020 14:58:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4052932#M1068281</guid>
      <dc:creator>DavidM0567</dc:creator>
      <dc:date>2020-03-26T14:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA ssh not connecting with cipher error</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4053358#M1068317</link>
      <description>&lt;P&gt;Is that coming from the ASA? I think so because the source is a Cisco MAC address. In the capture we see:&lt;/P&gt;
&lt;PRE&gt;TLSv1.2 Record Layer: Alert (Level: Fatal, Description: Handshake Failure)&lt;/PRE&gt;
&lt;P&gt;That usually indicates the client didn't propose any acceptable cipher suites in the Client Hello. We would normally expect something like this from the client:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TLS Client Hello.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/70035i8B3E91EF8907654B/image-size/large?v=v2&amp;amp;px=999" role="button" title="TLS Client Hello.PNG" alt="TLS Client Hello.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;...after which the server replies with its hello and proposes the strongest mutually supported cipher suite for the conversation going forward:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TLS Server Hello.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/70034i2941B0DB5E86A35E/image-size/large?v=v2&amp;amp;px=999" role="button" title="TLS Server Hello.PNG" alt="TLS Server Hello.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If there is no overlapping cipher suite available, the ASA will reply with a handshake failure.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2020 03:36:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4053358#M1068317</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-03-27T03:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA ssh not connecting with cipher error</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4057922#M1068659</link>
      <description>&lt;P&gt;I changed the tls 1.2 setting to all&lt;/P&gt;&lt;P&gt;ssl cipher tlsv1.2 all&lt;/P&gt;&lt;P&gt;I am now able to ssh, https, and asdm into the asa.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you all&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 19:38:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-connecting-with-cipher-error/m-p/4057922#M1068659</guid>
      <dc:creator>DavidM0567</dc:creator>
      <dc:date>2020-04-02T19:38:23Z</dc:date>
    </item>
  </channel>
</rss>

