<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to SSH/HTTPS ASAv30 deployed on AWS on its inside interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-ssh-https-asav30-deployed-on-aws-on-its-inside/m-p/4132888#M1072793</link>
    <description>ok, can you try to generate new ssh keys and attempt again.&lt;BR /&gt;&lt;BR /&gt;&amp;gt;From the capture seems that your ASAv isn't responding. Also on ASA&lt;BR /&gt;enabling logging console to see the messages when you attempt to connect&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
    <pubDate>Mon, 10 Aug 2020 07:34:30 GMT</pubDate>
    <dc:creator>Mohammed al Baqari</dc:creator>
    <dc:date>2020-08-10T07:34:30Z</dc:date>
    <item>
      <title>Unable to SSH/HTTPS ASAv30 deployed on AWS on its inside interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-https-asav30-deployed-on-aws-on-its-inside/m-p/4132838#M1072784</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have used the following IPs for reference :&lt;/P&gt;&lt;P&gt;Jump Server IP: 192.168.10.5 (Subnet A - AWS)&lt;/P&gt;&lt;P&gt;ASAv30 inside interface IP: 192.168.20.5 (subnet B - AWS)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Able to ping the ASAv inside interface from the Jump Server, but unable to SSH/HTTPS the ASAv inside interface when initiating a request from Jump Server.&lt;/P&gt;&lt;P&gt;Following captures observed on inside interface:&lt;/P&gt;&lt;P&gt;SSH:&lt;BR /&gt;1: 07:35:25.236712 192.168.10.5.51412 &amp;gt; 192.168.20.5.22: SWE 2005654349:2005654349(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;2: 07:35:28.249987 192.168.10.5.51412 &amp;gt; 192.168.20.5.22: SWE 2005654349:2005654349(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;3: 07:35:34.251955 192.168.10.5.51412 &amp;gt; 192.168.20.5.22: S 2005654349:2005654349(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTTPS:&lt;BR /&gt;4: 07:36:45.567261 192.168.10.5.51419 &amp;gt; 192.168.20.5.443: SWE 2582893096:2582893096(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;5: 07:36:45.572403 192.168.10.5.51420 &amp;gt; 192.168.20.5.443: SWE 1423861587:1423861587(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;6: 07:36:45.818210 192.168.10.5.51421 &amp;gt; 192.168.20.5.443: SWE 4143246363:4143246363(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;7: 07:36:48.567322 192.168.10.5.51419 &amp;gt; 192.168.20.5.443: SWE 2582893096:2582893096(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;8: 07:36:48.572205 192.168.10.5.51420 &amp;gt; 192.168.20.5.443: SWE 1423861587:1423861587(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;9: 07:36:48.818347 192.168.10.5.51421 &amp;gt; 192.168.20.5.443: SWE 4143246363:4143246363(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;10: 07:36:54.567612 192.168.10.5.51419 &amp;gt; 192.168.20.5.443: S 2582893096:2582893096(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;11: 07:36:54.572434 192.168.10.5.51420 &amp;gt; 192.168.20.5.443: S 1423861587:1423861587(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;12: 07:36:54.818484 192.168.10.5.51421 &amp;gt; 192.168.20.5.443: S 4143246363:4143246363(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Also tried the command "debug HTTP 255" while initiating https traffic but got no logs on the device.&lt;/P&gt;&lt;P&gt;the following commands are configured to provision access:&lt;/P&gt;&lt;P&gt;ssh 192.168.10.5 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;http&amp;nbsp;192.168.10.5 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 04:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-https-asav30-deployed-on-aws-on-its-inside/m-p/4132838#M1072784</guid>
      <dc:creator>S.U.H.E.L</dc:creator>
      <dc:date>2020-08-10T04:57:58Z</dc:date>
    </item>
    <item>
      <title>Spanning Tree Protocols (Identifying Root Ports,Electing an STP Root Bridge )</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-https-asav30-deployed-on-aws-on-its-inside/m-p/4132850#M1072785</link>
      <description>&lt;P&gt;&lt;A title="Spanning Tree Protocols" href="https://thingitinfo.blogspot.com/search/label/STP%28Spanning%20Tree%20Protocol%20%29?&amp;amp;max-results=10" target="_blank" rel="noopener"&gt;Spanning Tree protocols&amp;nbsp;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 05:41:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-https-asav30-deployed-on-aws-on-its-inside/m-p/4132850#M1072785</guid>
      <dc:creator>Gourmetcola2746237</dc:creator>
      <dc:date>2020-08-10T05:41:33Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH/HTTPS ASAv30 deployed on AWS on its inside interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-https-asav30-deployed-on-aws-on-its-inside/m-p/4132866#M1072791</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Is subnetA another zone on the same ASAv. If yes, you can't ssh or https&lt;BR /&gt;from one zone to another on the same ASAv unless over VPN tunnel.&lt;BR /&gt;&lt;BR /&gt;***** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Mon, 10 Aug 2020 06:34:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-https-asav30-deployed-on-aws-on-its-inside/m-p/4132866#M1072791</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2020-08-10T06:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH/HTTPS ASAv30 deployed on AWS on its inside interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-https-asav30-deployed-on-aws-on-its-inside/m-p/4132882#M1072792</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/292493"&gt;@Mohammed al Baqari&lt;/a&gt;, Subnet A is in a different and does not belong to the ASAv.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 07:21:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-https-asav30-deployed-on-aws-on-its-inside/m-p/4132882#M1072792</guid>
      <dc:creator>S.U.H.E.L</dc:creator>
      <dc:date>2020-08-10T07:21:02Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH/HTTPS ASAv30 deployed on AWS on its inside interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-https-asav30-deployed-on-aws-on-its-inside/m-p/4132888#M1072793</link>
      <description>ok, can you try to generate new ssh keys and attempt again.&lt;BR /&gt;&lt;BR /&gt;&amp;gt;From the capture seems that your ASAv isn't responding. Also on ASA&lt;BR /&gt;enabling logging console to see the messages when you attempt to connect&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Mon, 10 Aug 2020 07:34:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-https-asav30-deployed-on-aws-on-its-inside/m-p/4132888#M1072793</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2020-08-10T07:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH/HTTPS ASAv30 deployed on AWS on its inside interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-https-asav30-deployed-on-aws-on-its-inside/m-p/4133046#M1072812</link>
      <description>&lt;P&gt;Generated new keys using the following command:&lt;BR /&gt;crypto key generate rsa general-keys modulus 1024&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tried connecting again, but the same result. Logging buffered is enabled but did not receive any logs for source 192.168.10.5.&lt;/P&gt;&lt;P&gt;However, the capture still shows the same traffic as shared in my original query.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 13:02:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-https-asav30-deployed-on-aws-on-its-inside/m-p/4133046#M1072812</guid>
      <dc:creator>S.U.H.E.L</dc:creator>
      <dc:date>2020-08-10T13:02:23Z</dc:date>
    </item>
  </channel>
</rss>

