<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA - ssh not working on WAN interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-working-on-wan-interface/m-p/4133774#M1072842</link>
    <description>&lt;P&gt;When you say it's not working, what exactly do you see when you try to ssh to the outside interface? Are you coming at it from an outside network?&lt;/P&gt;</description>
    <pubDate>Tue, 11 Aug 2020 13:08:37 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2020-08-11T13:08:37Z</dc:date>
    <item>
      <title>Cisco ASA - ssh not working on WAN interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-working-on-wan-interface/m-p/4133763#M1072841</link>
      <description>&lt;P&gt;Hello Guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Need help on troubleshooting the ssh from outside(WAN) interface, I attached the config below. Please advice with commands for troubleshooting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Result of the command: "sh run"&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;Result of the command: "sh run"&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;&lt;BR /&gt;ASA Version 9.9(1)&lt;BR /&gt;!&lt;BR /&gt;hostname A1ASA&lt;/P&gt;&lt;P&gt;enable password mgCeL9SBd2ZbybMR encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool TechMonks-Pool 192.168.235.1-192.168.235.10 mask 255.255.255.0&lt;BR /&gt;ip local pool VPNpool 10.222.225.1-10.222.225.254 mask 255.255.255.0&lt;BR /&gt;ip local pool McCallum-Pool 10.123.123.1-10.123.123.21 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;description Outside&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address x.x.x.x 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;description inside&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 90&lt;BR /&gt;ip address 10.222.222.1 255.255.252.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;nameif AirbossMimic&lt;BR /&gt;security-level 40&lt;BR /&gt;ip address 192.168.1.7 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;description Development&lt;BR /&gt;nameif Development&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 192.168.175.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;description Security&lt;BR /&gt;nameif Security&lt;BR /&gt;security-level 80&lt;BR /&gt;ip address 10.211.211.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;description Rogers-LAN-EXT&lt;BR /&gt;speed 100&lt;BR /&gt;duplex full&lt;BR /&gt;nameif Rogers-LAN-EXT&lt;BR /&gt;security-level 90&lt;BR /&gt;ip address 172.30.1.222 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;description Phone System&lt;BR /&gt;nameif New-Phone&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;ip address 192.168.149.3 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa991-lfbff-k8.SPA&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup Development&lt;BR /&gt;dns domain-lookup Security&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 10.222.222.12&lt;BR /&gt;domain-name ableone.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network NETWORK_OBJ_10.199.196.0_22&lt;BR /&gt;subnet 10.199.196.0 255.255.252.0&lt;BR /&gt;object network NETWORK_OBJ_10.222.220.0_22&lt;BR /&gt;subnet 10.222.220.0 255.255.252.0&lt;BR /&gt;object network Inside_Network&lt;BR /&gt;subnet 10.222.220.0 255.255.252.0&lt;BR /&gt;description Inside_Network&lt;BR /&gt;object network Generic&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network SecurityController&lt;BR /&gt;host 10.211.211.10&lt;BR /&gt;description SecurityController&lt;BR /&gt;object network Security_Net&lt;BR /&gt;subnet 10.211.211.0 255.255.255.0&lt;BR /&gt;description Security_Net&lt;BR /&gt;object network Sec-Net&lt;BR /&gt;subnet 10.222.220.0 255.255.252.0&lt;BR /&gt;description Sec-Net&lt;BR /&gt;object network NETWORK_OBJ_10.222.225.0_24&lt;BR /&gt;subnet 10.222.225.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_172.30.1.0_24&lt;BR /&gt;subnet 172.30.1.0 255.255.255.0&lt;BR /&gt;description NETWORK_OBJ_172.30.1.0_24&lt;BR /&gt;object network PoC-Phone&lt;BR /&gt;subnet 10.10.10.0 255.255.255.0&lt;BR /&gt;object network TechMonksVPN&lt;BR /&gt;description TechMonksVPN Client Range&lt;BR /&gt;object network TechMonksNet&lt;BR /&gt;subnet 192.168.235.0 255.255.255.0&lt;BR /&gt;description TechMonks VPN Network&lt;BR /&gt;object network Fibernetics-Phone&lt;BR /&gt;subnet 10.10.10.0 255.255.255.0&lt;BR /&gt;description Fibernetics-Phone&lt;BR /&gt;object network NETWORK_OBJ_192.168.175.0_24&lt;BR /&gt;subnet 192.168.175.0 255.255.255.0&lt;BR /&gt;object network FOCU-NET&lt;BR /&gt;subnet 10.1.30.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_10.123.123.0_27&lt;BR /&gt;subnet 10.123.123.0 255.255.255.224&lt;BR /&gt;object network A1Cogent-Internal&lt;BR /&gt;subnet 10.17.25.0 255.255.255.0&lt;BR /&gt;description A1Cogent Internal Network&lt;BR /&gt;object network A1Cogent-Management&lt;BR /&gt;subnet 10.20.77.0 255.255.255.0&lt;BR /&gt;description A1 Cogent Management Network&lt;BR /&gt;object network TMGInside&lt;BR /&gt;subnet 10.170.150.0 255.255.254.0&lt;BR /&gt;description Trimach Inside Network in staging area&lt;BR /&gt;object network TMG-HQLocalNetwork&lt;BR /&gt;subnet 192.168.6.0 255.255.255.0&lt;BR /&gt;description Trimach Elmira local network&lt;BR /&gt;object network A1-Rogers-VPNPool&lt;BR /&gt;subnet 192.168.222.0 255.255.255.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object 192.168.175.0 255.255.255.0&lt;BR /&gt;network-object object Inside_Network&lt;BR /&gt;network-object object Security_Net&lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt;service-object icmp&lt;BR /&gt;service-object icmp echo&lt;BR /&gt;service-object icmp echo-reply&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;network-object 10.222.220.0 255.255.252.0&lt;BR /&gt;network-object object NETWORK_OBJ_10.222.225.0_24&lt;BR /&gt;object-group service DM_INLINE_SERVICE_4&lt;BR /&gt;service-object icmp&lt;BR /&gt;service-object icmp echo&lt;BR /&gt;service-object icmp echo-reply&lt;BR /&gt;object-group service DM_INLINE_SERVICE_5&lt;BR /&gt;service-object icmp&lt;BR /&gt;service-object icmp echo&lt;BR /&gt;service-object icmp echo-reply&lt;BR /&gt;object-group service DM_INLINE_SERVICE_6&lt;BR /&gt;service-object icmp&lt;BR /&gt;service-object icmp echo&lt;BR /&gt;service-object icmp echo-reply&lt;BR /&gt;object-group service DM_INLINE_SERVICE_8&lt;BR /&gt;service-object icmp&lt;BR /&gt;service-object icmp echo&lt;BR /&gt;service-object icmp echo-reply&lt;BR /&gt;object-group service POC-Phones udp&lt;BR /&gt;port-object range 10000 20000&lt;BR /&gt;port-object eq sip&lt;BR /&gt;object-group service DM_INLINE_SERVICE_9&lt;BR /&gt;service-object icmp&lt;BR /&gt;service-object icmp echo&lt;BR /&gt;service-object icmp echo-reply&lt;BR /&gt;object-group service POC-Phone_Ports&lt;BR /&gt;object-group service DM_INLINE_SERVICE_10&lt;BR /&gt;service-object ip&lt;BR /&gt;service-object icmp&lt;BR /&gt;service-object icmp echo&lt;BR /&gt;service-object icmp echo-reply&lt;BR /&gt;object-group service DM_INLINE_SERVICE_11&lt;BR /&gt;service-object ip&lt;BR /&gt;service-object tcp destination eq www&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt;network-object object NETWORK_OBJ_10.222.220.0_22&lt;BR /&gt;network-object object NETWORK_OBJ_10.222.225.0_24&lt;BR /&gt;object-group network FOCU&lt;BR /&gt;network-object host 10.1.30.45&lt;BR /&gt;network-object host 10.1.40.45&lt;BR /&gt;network-object host 10.1.80.12&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;service-object icmp&lt;BR /&gt;service-object icmp echo&lt;BR /&gt;service-object icmp echo-reply&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_4&lt;BR /&gt;network-object object A1Cogent-Internal&lt;BR /&gt;network-object object A1Cogent-Management&lt;BR /&gt;object-group network DM_INLINE_NETWORK_5&lt;BR /&gt;network-object 192.168.175.0 255.255.255.0&lt;BR /&gt;network-object object TMGInside&lt;BR /&gt;object-group network DevNetwork&lt;BR /&gt;network-object 192.168.175.0 255.255.255.0&lt;BR /&gt;access-list outside_cryptomap extended permit ip object Inside_Network object NETWORK_OBJ_10.199.196.0_22&lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_6 any any&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 2601&lt;BR /&gt;access-list outside_access_in extended permit udp any any object-group POC-Phones inactive&lt;BR /&gt;access-list inside_access_in extended permit ip 10.222.220.0 255.255.252.0 any&lt;BR /&gt;access-list inside_access_in extended permit ip 10.222.220.0 255.255.252.0 10.222.225.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in_1 extended permit ip host 10.222.221.221 192.168.235.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in_1 extended deny ip 10.222.220.0 255.255.252.0 192.168.235.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in_1 extended permit ip any 10.222.225.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in_1 extended permit ip any 10.10.10.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in_1 extended permit ip any 10.211.211.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in_1 extended permit ip any 10.199.196.0 255.255.252.0&lt;BR /&gt;access-list inside_access_in_1 extended permit ip any 192.168.175.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in_1 extended permit udp any 10.199.196.0 255.255.252.0&lt;BR /&gt;access-list inside_access_in_1 extended permit object-group DM_INLINE_SERVICE_5 any any&lt;BR /&gt;access-list inside_access_in_1 extended permit ip any any&lt;BR /&gt;access-list Security_access_in extended permit object-group DM_INLINE_SERVICE_4 any any&lt;BR /&gt;access-list Security_access_in extended permit ip any any&lt;BR /&gt;access-list Development_access_in extended permit object-group DM_INLINE_SERVICE_2 any any&lt;BR /&gt;access-list Development_access_in extended permit ip any object Inside_Network&lt;BR /&gt;access-list Development_access_in extended permit ip any object-group DM_INLINE_NETWORK_3 inactive&lt;BR /&gt;access-list Development_access_in extended permit ip object TMGInside object TMG-HQLocalNetwork&lt;BR /&gt;access-list Development_access_in extended permit ip any any&lt;BR /&gt;access-list SPLIT standard permit 10.222.220.0 255.255.252.0&lt;BR /&gt;access-list SPLIT standard permit 10.10.10.0 255.255.255.0&lt;BR /&gt;access-list SPLIT standard permit 192.168.175.0 255.255.255.0&lt;BR /&gt;access-list SPLIT standard permit 10.199.196.0 255.255.252.0&lt;BR /&gt;access-list SPLIT standard permit 192.168.222.0 255.255.255.0&lt;BR /&gt;access-list Rogers-LAN-EXT_access_in extended permit object-group DM_INLINE_SERVICE_8 any any&lt;BR /&gt;access-list Rogers-LAN-EXT_access_in extended permit ip any any&lt;BR /&gt;access-list AllIn1_splitTunnelAcl standard permit 192.168.175.0 255.255.255.0&lt;BR /&gt;access-list PoC-Phone_access_in extended permit object-group DM_INLINE_SERVICE_10 object PoC-Phone object-group DM_INLINE_NETWORK_2&lt;BR /&gt;access-list PoC-Phone_access_in extended permit object-group DM_INLINE_SERVICE_11 object PoC-Phone any&lt;BR /&gt;access-list PoC-Phone_access_in extended permit object-group DM_INLINE_SERVICE_9 any any&lt;BR /&gt;access-list PoC-Phone_access_in extended permit ip any any&lt;BR /&gt;access-list TechMonks-Split standard permit 10.222.220.0 255.255.252.0&lt;BR /&gt;access-list nonat extended permit ip 10.10.10.0 255.255.255.0 10.222.225.0 255.255.255.0&lt;BR /&gt;access-list outside_cryptomap_2 extended permit ip 192.168.175.0 255.255.255.0 object FOCU-NET&lt;BR /&gt;access-list McCallum_access_in extended permit object-group DM_INLINE_SERVICE_1 any any&lt;BR /&gt;access-list McCallum_access_in extended permit ip any any&lt;BR /&gt;access-list McCallum-Split standard permit 10.40.40.0 255.255.252.0&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended deny ip any4 any4&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq lpd&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 631&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark Windows' printing port&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 9100&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.251 eq 5353&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.252 eq 5355&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 137&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 any4 eq netbios-ns&lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip 10.222.220.0 255.255.252.0 object-group DM_INLINE_NETWORK_4&lt;BR /&gt;access-list outside_cryptomap_3 extended permit ip object-group DM_INLINE_NETWORK_5 object TMG-HQLocalNetwork&lt;BR /&gt;access-list AirbossMimic_access_in extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging history informational&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging host Rogers-LAN-EXT 10.199.198.225&lt;BR /&gt;logging permit-hostdown&lt;BR /&gt;flow-export destination Rogers-LAN-EXT 10.199.199.59 2055&lt;BR /&gt;flow-export destination Rogers-LAN-EXT 10.199.198.225 2055&lt;BR /&gt;flow-export template timeout-rate 1&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu AirbossMimic 1500&lt;BR /&gt;mtu Development 1500&lt;BR /&gt;mtu Security 1500&lt;BR /&gt;mtu Rogers-LAN-EXT 1500&lt;BR /&gt;mtu New-Phone 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any Development&lt;BR /&gt;icmp permit any Security&lt;BR /&gt;icmp permit any Rogers-LAN-EXT&lt;BR /&gt;icmp permit any New-Phone&lt;BR /&gt;asdm image disk0:/asdm-791.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp inside 10.222.220.225 5cff.3505.9be2&lt;BR /&gt;arp inside 10.222.222.222 013c.970e.7be6&lt;BR /&gt;arp timeout 28800&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (Development,outside) source static TMGInside TMGInside destination static TMG-HQLocalNetwork TMG-HQLocalNetwork no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_10.222.220.0_22 NETWORK_OBJ_10.222.220.0_22 destination static NETWORK_OBJ_10.199.196.0_22 NETWORK_OBJ_10.199.196.0_22 route-lookup&lt;BR /&gt;nat (inside,Rogers-LAN-EXT) source static Inside_Network Inside_Network destination static NETWORK_OBJ_10.199.196.0_22 NETWORK_OBJ_10.199.196.0_22 route-lookup&lt;BR /&gt;nat (inside,outside) source static Inside_Network Inside_Network destination static A1-Rogers-VPNPool A1-Rogers-VPNPool no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,Rogers-LAN-EXT) source static Inside_Network Inside_Network destination static A1-Rogers-VPNPool A1-Rogers-VPNPool no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_10.222.220.0_22 NETWORK_OBJ_10.222.220.0_22 destination static DM_INLINE_NETWORK_4 DM_INLINE_NETWORK_4 no-proxy-arp route-lookup&lt;BR /&gt;nat (Development,outside) source static NETWORK_OBJ_192.168.175.0_24 NETWORK_OBJ_192.168.175.0_24 destination static FOCU-NET FOCU-NET no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static Inside_Network Inside_Network destination static NETWORK_OBJ_10.222.225.0_24 NETWORK_OBJ_10.222.225.0_24&lt;BR /&gt;nat (New-Phone,outside) source static PoC-Phone PoC-Phone destination static NETWORK_OBJ_10.222.225.0_24 NETWORK_OBJ_10.222.225.0_24&lt;BR /&gt;nat (inside,outside) source static Inside_Network Inside_Network destination static TechMonksNet TechMonksNet&lt;BR /&gt;nat (inside,New-Phone) source static NETWORK_OBJ_10.222.220.0_22 NETWORK_OBJ_10.222.220.0_22 destination static Fibernetics-Phone Fibernetics-Phone&lt;BR /&gt;nat (Development,outside) source static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 destination static NETWORK_OBJ_10.222.225.0_24 NETWORK_OBJ_10.222.225.0_24&lt;BR /&gt;nat (inside,Development) source static Inside_Network Inside_Network destination static NETWORK_OBJ_192.168.175.0_24 NETWORK_OBJ_192.168.175.0_24&lt;BR /&gt;nat (inside,Security) source static Inside_Network Inside_Network destination static Security_Net Security_Net&lt;BR /&gt;nat (Development,outside) source static NETWORK_OBJ_192.168.175.0_24 NETWORK_OBJ_192.168.175.0_24 destination static TMG-HQLocalNetwork TMG-HQLocalNetwork no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static Inside_Network Inside_Network destination static NETWORK_OBJ_10.199.196.0_22 NETWORK_OBJ_10.199.196.0_22 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network Generic&lt;BR /&gt;nat (any,outside) dynamic interface&lt;BR /&gt;object network SecurityController&lt;BR /&gt;nat (Security,outside) static interface service tcp 2601 2601&lt;BR /&gt;object network Security_Net&lt;BR /&gt;nat (inside,inside) dynamic interface dns&lt;BR /&gt;object network Fibernetics-Phone&lt;BR /&gt;nat (inside,inside) dynamic interface dns&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in_1 in interface inside&lt;BR /&gt;access-group AirbossMimic_access_in in interface AirbossMimic&lt;BR /&gt;access-group Development_access_in in interface Development&lt;BR /&gt;access-group Security_access_in in interface Security&lt;BR /&gt;access-group Rogers-LAN-EXT_access_in in interface Rogers-LAN-EXT&lt;BR /&gt;access-group PoC-Phone_access_in in interface New-Phone&lt;BR /&gt;route Rogers-LAN-EXT 10.199.196.0 255.255.252.0 172.30.1.199 1 track 1&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;BR /&gt;route Development 10.170.150.0 255.255.254.0 192.168.175.2 1&lt;BR /&gt;route outside 10.199.196.0 255.255.252.0 x.x.x.x 150&lt;BR /&gt;route Rogers-LAN-EXT 192.168.222.0 255.255.255.0 172.30.1.199 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable 666&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 Development&lt;BR /&gt;http 0.0.0.0 0.0.0.0 Security&lt;BR /&gt;snmp-server host Rogers-LAN-EXT 10.199.198.225 community ***** version 2c&lt;BR /&gt;snmp-server host inside 10.199.199.250 community *****&lt;BR /&gt;snmp-server host Rogers-LAN-EXT 10.199.199.59 community ***** version 2c udp-port 161&lt;BR /&gt;snmp-server host inside 10.222.220.135 community ***** version 2c&lt;BR /&gt;snmp-server host inside 10.222.222.12 community ***** version 2c udp-port 161&lt;BR /&gt;snmp-server host Development 10.199.199.125 community *****&lt;BR /&gt;snmp-server location A1-Office-KW&lt;BR /&gt;snmp-server contact The Man&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;sysopt noproxyarp inside&lt;BR /&gt;sysopt noproxyarp Development&lt;BR /&gt;sysopt noproxyarp Security&lt;BR /&gt;sysopt noproxyarp Rogers-LAN-EXT&lt;BR /&gt;sysopt noproxyarp New-Phone&lt;BR /&gt;sla monitor 123&lt;BR /&gt;type echo protocol ipIcmpEcho 10.199.199.241 interface Rogers-LAN-EXT&lt;BR /&gt;num-packets 2&lt;BR /&gt;frequency 5&lt;BR /&gt;sla monitor schedule 123 life forever start-time now&lt;BR /&gt;sla monitor 124&lt;BR /&gt;type echo protocol ipIcmpEcho 172.30.1.199 interface Rogers-LAN-EXT&lt;BR /&gt;num-packets 2&lt;BR /&gt;frequency 5&lt;BR /&gt;sla monitor schedule 124 life forever start-time now&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;protocol esp encryption des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;protocol esp encryption 3des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;protocol esp encryption aes&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;protocol esp encryption aes-192&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 1 match address outside_cryptomap&lt;BR /&gt;crypto map outside_map 1 set pfs group5&lt;BR /&gt;crypto map outside_map 1 set peer x.x.x.x&lt;BR /&gt;crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 1 set security-association lifetime kilobytes unlimited&lt;BR /&gt;crypto map outside_map 2 match address outside_cryptomap_2&lt;BR /&gt;crypto map outside_map 2 set peer x.x.x.x&lt;BR /&gt;crypto map outside_map 2 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 2 set ikev2 ipsec-proposal DES 3DES AES AES192 AES256&lt;BR /&gt;crypto map outside_map 3 match address outside_cryptomap_1&lt;BR /&gt;crypto map outside_map 3 set peer x.x.x.x&lt;BR /&gt;crypto map outside_map 3 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 3 set ikev2 ipsec-proposal DES 3DES AES AES192 AES256&lt;BR /&gt;crypto map outside_map 3 set security-association lifetime kilobytes unlimited&lt;BR /&gt;crypto map outside_map 4 match address outside_cryptomap_3&lt;BR /&gt;crypto map outside_map 4 set peer x.x.x.x&lt;BR /&gt;crypto map outside_map 4 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 4 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt;enrollment self&lt;BR /&gt;subject-name CN=A1ASA.ableone.local&lt;BR /&gt;proxy-ldc-issuer&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint1&lt;BR /&gt;enrollment self&lt;BR /&gt;subject-name CN=72.143.29.6&lt;BR /&gt;proxy-ldc-issuer&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca server&lt;BR /&gt;shutdown&lt;BR /&gt;cdp-url http://A1ASA/+CSCOCA+/asa_ca.crl&lt;BR /&gt;issuer-name CN=A1ASA&lt;BR /&gt;smtp from-address admin@A1ASA.null&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;encryption aes-192&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;encryption aes&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;encryption 3des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;encryption des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;crypto ikev2 enable Rogers-LAN-EXT&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 enable Rogers-LAN-EXT&lt;BR /&gt;crypto ikev1 policy 65535&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;!&lt;BR /&gt;track 1 rtr 124 reachability&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 Development&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 Security&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 Rogers-LAN-EXT&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;vpn-addr-assign local reuse-delay 15&lt;/P&gt;&lt;P&gt;dhcpd update dns both override&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.222.220.1-10.222.220.200 inside&lt;BR /&gt;dhcpd dns 10.222.222.12 10.199.199.110 interface inside&lt;BR /&gt;dhcpd lease 14400 interface inside&lt;BR /&gt;dhcpd domain ableone.com interface inside&lt;BR /&gt;dhcpd update dns both override interface inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.15-192.168.1.20 AirbossMimic&lt;BR /&gt;dhcpd dns 8.8.8.8 interface AirbossMimic&lt;BR /&gt;dhcpd lease 28800 interface AirbossMimic&lt;BR /&gt;dhcpd enable AirbossMimic&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.175.100-192.168.175.200 Development&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface Development&lt;BR /&gt;dhcpd lease 28800 interface Development&lt;BR /&gt;dhcpd domain ableone.com interface Development&lt;BR /&gt;dhcpd enable Development&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.211.211.100-10.211.211.110 Security&lt;BR /&gt;dhcpd dns 10.222.222.12 10.199.199.110 interface Security&lt;BR /&gt;dhcpd enable Security&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.10.10.11-10.10.10.200 New-Phone&lt;BR /&gt;dhcpd dns 8.8.8.8 interface New-Phone&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 69.87.223.252 source outside&lt;BR /&gt;ntp server 198.245.51.213 source outside&lt;BR /&gt;ntp server 174.142.39.145 source outside&lt;BR /&gt;ntp server 144.217.65.182 source outside&lt;BR /&gt;ssl cipher default custom "RC4-SHA:AES128-SHA:AES256-SHA:DES-CBC3-SHA:DES-CBC-SHA"&lt;BR /&gt;ssl cipher tlsv1 custom "RC4-SHA:AES128-SHA:AES256-SHA:DES-CBC3-SHA:DES-CBC-SHA"&lt;BR /&gt;ssl cipher dtlsv1 custom "RC4-SHA:AES128-SHA:AES256-SHA:DES-CBC3-SHA:DES-CBC-SHA"&lt;BR /&gt;webvpn&lt;BR /&gt;port 444&lt;BR /&gt;enable outside&lt;BR /&gt;enable Development&lt;BR /&gt;dtls port 444&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-4.4.04030-webdeploy-k9.pkg 1&lt;BR /&gt;anyconnect image disk0:/anyconnect-linux64-4.4.04030-webdeploy-k9.pkg 2&lt;BR /&gt;anyconnect image disk0:/anyconnect-macos-4.4.04030-webdeploy-k9.pkg 3&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;internal-password enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;error-recovery disable&lt;BR /&gt;group-policy A1-Office internal&lt;BR /&gt;group-policy A1-Office attributes&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value SPLIT&lt;BR /&gt;vlan none&lt;BR /&gt;group-policy TechMonks internal&lt;BR /&gt;group-policy TechMonks attributes&lt;BR /&gt;dns-server value 8.8.8.8 8.8.4.4&lt;BR /&gt;vpn-access-hours none&lt;BR /&gt;vpn-simultaneous-logins 3&lt;BR /&gt;vpn-idle-timeout 30&lt;BR /&gt;vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless&lt;BR /&gt;group-lock value TechMonks&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value TechMonks-Split&lt;BR /&gt;address-pools value TechMonks-Pool&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect keep-installer installed&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;dns-server value 10.222.222.12&lt;BR /&gt;vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value SPLIT&lt;BR /&gt;default-domain value ableone.com&lt;BR /&gt;group-policy GroupPolicy_McCallumVPN internal&lt;BR /&gt;group-policy GroupPolicy_McCallumVPN attributes&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server value 10.40.40.3 10.40.40.4&lt;BR /&gt;vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-client&lt;BR /&gt;split-tunnel-policy tunnelall&lt;BR /&gt;split-tunnel-network-list value McCallum-Split&lt;BR /&gt;default-domain value mccs.local&lt;BR /&gt;group-policy GroupPolicy_206.47.171.229 internal&lt;BR /&gt;group-policy GroupPolicy_206.47.171.229 attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1 ikev2&lt;BR /&gt;group-policy GroupPolicy_108.63.14.146 internal&lt;BR /&gt;group-policy GroupPolicy_108.63.14.146 attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1&lt;BR /&gt;group-policy GroupPolicy_38.17.20.92 internal&lt;BR /&gt;group-policy GroupPolicy_38.17.20.92 attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1 ikev2&lt;BR /&gt;group-policy GroupPolicy_162.212.232.190 internal&lt;BR /&gt;group-policy GroupPolicy_162.212.232.190 attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1 ikev2&lt;BR /&gt;group-policy AllIn1 internal&lt;BR /&gt;group-policy AllIn1 attributes&lt;BR /&gt;dns-server value 10.222.222.12&lt;BR /&gt;vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-client&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value AllIn1_splitTunnelAcl&lt;BR /&gt;default-domain value ableone.local&lt;BR /&gt;dynamic-access-policy-record A1Office-VPN&lt;BR /&gt;webvpn&lt;BR /&gt;file-browsing enable&lt;BR /&gt;file-entry enable&lt;BR /&gt;svc ask enable default svc&lt;BR /&gt;always-on-vpn profile-setting&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username sshah password $sha512$5000$ClD9dCJ3YKRaTRNSsHNgfQ==$NHmW8ZGmZWHIJvIWkIzGFQ== pbkdf2&lt;BR /&gt;username sshah attributes&lt;BR /&gt;vpn-group-policy A1-Office&lt;BR /&gt;username rbruce password $sha512$5000$5RHk0rfna+EIf+JIliQwfg==$2Ast7zSQjYSCLQcLQ/e9vA== pbkdf2&lt;BR /&gt;username rbruce attributes&lt;BR /&gt;service-type remote-access&lt;BR /&gt;username duane password $sha512$5000$eIUdrP+2sUi793Y5dXITFQ==$+lBhAG9YTqx31d75yYkjvg== pbkdf2&lt;BR /&gt;username duane attributes&lt;BR /&gt;service-type remote-access&lt;BR /&gt;username TechWiz password xOJJwOGzbSO9kaoh encrypted privilege 0&lt;BR /&gt;username TechWiz attributes&lt;BR /&gt;vpn-group-policy TechMonks&lt;BR /&gt;username rcampbell password Xrq5bBsSgAwmVi6/ encrypted&lt;BR /&gt;username ModernWorks password lEz0kDHlI4p17C1A encrypted&lt;BR /&gt;username asuter password $sha512$5000$tJiJxbT9YAljbs6/UDygSw==$9KTGAjw2HZssB7fAD7sUmw== pbkdf2&lt;BR /&gt;username ableone password 0Tf7jgrtHuufsPfn encrypted privilege 15&lt;BR /&gt;username dperco password 0MLknrIFlnuxm2yq encrypted&lt;BR /&gt;username grant password yosASoGeVtPsSimX encrypted&lt;BR /&gt;username dbryndza password $sha512$5000$NukH6y2heDYMNfVLuEgTeA==$geQe68P3mxvmUsyLqTdaPw== pbkdf2&lt;BR /&gt;username dbryndza attributes&lt;BR /&gt;vpn-group-policy A1-Office&lt;BR /&gt;username gary password pw4mQ7q5jaWBQAwY encrypted privilege 0&lt;BR /&gt;username gary attributes&lt;BR /&gt;vpn-group-policy A1-Office&lt;BR /&gt;username tschmied password $sha512$5000$b9D4n9NkYDC3mP2k5ctqbw==$kfWRi3l2bJUa1lJJvSQhOA== pbkdf2&lt;BR /&gt;username tschmied attributes&lt;BR /&gt;vpn-group-policy A1-Office&lt;BR /&gt;username stefan password zY5pJt05Q/cLKBQu encrypted privilege 0&lt;BR /&gt;username stefan attributes&lt;BR /&gt;vpn-group-policy A1-Office&lt;BR /&gt;username kstewart password r.8BdlmN.awUt.jr encrypted&lt;BR /&gt;username ltelford password Oeiv3AKot.fFvAeQ encrypted&lt;BR /&gt;username iainc password FNTpNDsweZwyUbq6 encrypted&lt;BR /&gt;username ahmad password $sha512$5000$07NbzR/UlobCUCnG5sbRkw==$xryLn0YmK/NCymSXAyk9IQ== pbkdf2&lt;BR /&gt;username hreis password PO/dXbvjQvgwuhVU encrypted privilege 15&lt;BR /&gt;username jacques password $sha512$5000$SoRvhXGGTL4eazlCy4TgDw==$2gvmthISgFHxhOZNRje4qA== pbkdf2&lt;BR /&gt;username jacques attributes&lt;BR /&gt;vpn-group-policy A1-Office&lt;BR /&gt;username ConnsVPN password kqpJnFnJzCSLBiNb encrypted&lt;BR /&gt;username Mark password 6CqaphipqizA6Oak encrypted&lt;BR /&gt;username Boris password cppW657xqLCPmd99 encrypted&lt;BR /&gt;username lainc password jXJwMr8udXb0Ou/U encrypted&lt;BR /&gt;username Henrique password D8B0md9ueZShbM8h encrypted privilege 15&lt;BR /&gt;username MC-Test password $sha512$5000$56wKwJmsFr5B8PJSz0zh1w==$Gwehw5e2qeIlk+Y4TWeqwA== pbkdf2&lt;BR /&gt;username MC-Test attributes&lt;BR /&gt;vpn-group-policy GroupPolicy_McCallumVPN&lt;BR /&gt;group-lock value McCallumVPN&lt;BR /&gt;username lsingh password $sha512$5000$hE+PMcJpeidWMGQiJTv3mA==$Hj8aX/o6mIx2V1oaaZUSIw== pbkdf2 privilege 15&lt;BR /&gt;username BMcKnight password dTSBl1FwtuN5DHVH encrypted&lt;BR /&gt;username BMcKnight attributes&lt;BR /&gt;service-type remote-access&lt;BR /&gt;tunnel-group 108.63.14.146 type ipsec-l2l&lt;BR /&gt;tunnel-group 108.63.14.146 general-attributes&lt;BR /&gt;default-group-policy GroupPolicy_108.63.14.146&lt;BR /&gt;tunnel-group 108.63.14.146 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt;ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;tunnel-group A1Office type remote-access&lt;BR /&gt;tunnel-group A1Office general-attributes&lt;BR /&gt;address-pool VPNpool&lt;BR /&gt;default-group-policy A1-Office&lt;BR /&gt;tunnel-group A1Office webvpn-attributes&lt;BR /&gt;group-alias A1Office enable&lt;BR /&gt;tunnel-group ServiceVPN type remote-access&lt;BR /&gt;tunnel-group ServiceVPN general-attributes&lt;BR /&gt;address-pool VPNpool&lt;BR /&gt;tunnel-group ServiceVPN webvpn-attributes&lt;BR /&gt;group-alias A1-Service enable&lt;/P&gt;&lt;P&gt;tunnel-group AllIn1 type remote-access&lt;BR /&gt;tunnel-group AllIn1 general-attributes&lt;BR /&gt;address-pool VPNpool&lt;BR /&gt;default-group-policy AllIn1&lt;BR /&gt;tunnel-group AllIn1 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group TechMonks type remote-access&lt;BR /&gt;tunnel-group TechMonks general-attributes&lt;BR /&gt;address-pool TechMonks-Pool&lt;BR /&gt;default-group-policy TechMonks&lt;BR /&gt;tunnel-group TechMonks webvpn-attributes&lt;BR /&gt;group-alias TechMonks enable&lt;/P&gt;&lt;P&gt;tunnel-group 206.47.171.229 type ipsec-l2l&lt;BR /&gt;tunnel-group 206.47.171.229 general-attributes&lt;BR /&gt;default-group-policy GroupPolicy_206.47.171.229&lt;BR /&gt;tunnel-group 206.47.171.229 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt;ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;tunnel-group McCallumVPN type remote-access&lt;BR /&gt;tunnel-group McCallumVPN general-attributes&lt;BR /&gt;address-pool McCallum-Pool&lt;BR /&gt;default-group-policy GroupPolicy_McCallumVPN&lt;BR /&gt;tunnel-group McCallumVPN webvpn-attributes&lt;BR /&gt;group-alias McCallumVPN enable&lt;BR /&gt;tunnel-group 38.17.20.92 type ipsec-l2l&lt;BR /&gt;tunnel-group 38.17.20.92 general-attributes&lt;BR /&gt;default-group-policy GroupPolicy_38.17.20.92&lt;BR /&gt;tunnel-group 38.17.20.92 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt;ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;tunnel-group 162.212.232.190 type ipsec-l2l&lt;BR /&gt;tunnel-group 162.212.232.190 general-attributes&lt;BR /&gt;default-group-policy GroupPolicy_162.212.232.190&lt;BR /&gt;tunnel-group 162.212.232.190 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt;ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;description class-default&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect pptp&lt;BR /&gt;class class-default&lt;BR /&gt;flow-export event-type all destination 10.199.199.59 10.199.198.225&lt;BR /&gt;user-statistics accounting&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="noopener"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:28e111de1cbc1cd58bf1a3963111d5c5&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 12:55:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-working-on-wan-interface/m-p/4133763#M1072841</guid>
      <dc:creator>LovejitSingh1313</dc:creator>
      <dc:date>2020-08-11T12:55:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - ssh not working on WAN interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-working-on-wan-interface/m-p/4133774#M1072842</link>
      <description>&lt;P&gt;When you say it's not working, what exactly do you see when you try to ssh to the outside interface? Are you coming at it from an outside network?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 13:08:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-working-on-wan-interface/m-p/4133774#M1072842</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-08-11T13:08:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - ssh not working on WAN interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-working-on-wan-interface/m-p/4133842#M1072845</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes I am trying to ssh from Internet from my home. It create session and prompt for credentials but hen show Access denied. Same credentials working from inside network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 14:18:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-working-on-wan-interface/m-p/4133842#M1072845</guid>
      <dc:creator>LovejitSingh1313</dc:creator>
      <dc:date>2020-08-11T14:18:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - ssh not working on WAN interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-working-on-wan-interface/m-p/4134053#M1072862</link>
      <description>&lt;P&gt;When you try to connect from home are you on the VPN or not?&lt;/P&gt;
&lt;P&gt;Try it while not on VPN.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 18:52:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-working-on-wan-interface/m-p/4134053#M1072862</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-08-11T18:52:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - ssh not working on WAN interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-working-on-wan-interface/m-p/4134491#M1072881</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even disconnecting VPN does not help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 12:18:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-working-on-wan-interface/m-p/4134491#M1072881</guid>
      <dc:creator>LovejitSingh1313</dc:creator>
      <dc:date>2020-08-12T12:18:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - ssh not working on WAN interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-working-on-wan-interface/m-p/4134673#M1072900</link>
      <description>&lt;P&gt;I'd suggest you run a debug on the ASA (or look at info level syslogs) to ascertain why you are getting access denied for an otherwise valid user account.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 16:16:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-working-on-wan-interface/m-p/4134673#M1072900</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-08-12T16:16:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - ssh not working on WAN interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-working-on-wan-interface/m-p/4142033#M1073380</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/292493"&gt;@Mohammed al Baqari&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you suggest commands for ssh debug ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2020 21:02:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-working-on-wan-interface/m-p/4142033#M1073380</guid>
      <dc:creator>LovejitSingh1313</dc:creator>
      <dc:date>2020-08-26T21:02:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - ssh not working on WAN interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-working-on-wan-interface/m-p/4142143#M1073387</link>
      <description>&lt;P&gt;You can usually see it from a level 6 (informational) syslog entry. Make sure your syslog is set to that and monitor an attempt to login with the problem account while logged in on a working account.&lt;/P&gt;
&lt;P&gt;I find ADSM monitoring useful for this since you can make a display filter to exclude all of the tcp and udp session establishment and teardown messages that can obscure the problem you want to investigate.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 03:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-not-working-on-wan-interface/m-p/4142143#M1073387</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-08-27T03:30:42Z</dc:date>
    </item>
  </channel>
</rss>

