<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to manage (ssh/https) a cisco asa fom vpn anyconnect in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171733#M1075049</link>
    <description>&lt;P&gt;Can you please post the sanitized configs for review?&lt;/P&gt;</description>
    <pubDate>Thu, 22 Oct 2020 12:21:58 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2020-10-22T12:21:58Z</dc:date>
    <item>
      <title>How to manage (ssh/https) a cisco asa fom vpn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171264#M1075016</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try to connect in ssh or https to a cisco asa. We need to manage the firewall by the vpn anyconnect. I'm able to connect to any device in the nertwork but not the firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I try to connect to the management port via vpn I receive this error:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Through-the-device packet to/from management-only network is denied: tcp src outside:x.x.x.x/51689(LOCAL\admin) dst management:x.x.x.x/22&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I try to configure an other port for management with management-access mgmt2 and enable ssh and https on this port this is routed to a switch. So I connect to the firewall in vpn then passed throught the device and come back to the firewall. But id didn't work ....&amp;nbsp;&lt;/P&gt;&lt;P&gt;I receive these error... (check all the firewall rule and nating and everything seems ok)&amp;nbsp;&lt;/P&gt;&lt;P&gt;Routing failed to locate next hop for TCP from outside:x.x.x.x/51709 to mgmt2:x.x.x.x/8443&lt;/P&gt;&lt;P&gt;Built inbound TCP connection 33917206 for outside:x.x.x.x/51711 (x.x.x.x/51711)(LOCAL\admin) to mgmt2:x.x.x.x/8443 (x.x.x.x/8443) (admin)&lt;/P&gt;&lt;P&gt;Teardown TCP connection 33917206 for outside:x.x.x.x/51711(LOCAL\admin) to mgmt2:x.x.x.x/8443 duration 0:00:15 bytes 0 No valid adjacency (admin)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 19:54:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171264#M1075016</guid>
      <dc:creator>schnap</dc:creator>
      <dc:date>2020-10-21T19:54:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to manage (ssh/https) a cisco asa fom vpn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171270#M1075017</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178926"&gt;@schnap&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You will need to configure the command &lt;STRONG&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;management-access&lt;/SPAN&gt; &lt;VAR&gt;interface-name&lt;/VAR&gt; &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="ph synph"&gt;&lt;VAR&gt;Reference here:&lt;/VAR&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/configuration/general/asa-98-general-config/admin-management.html" target="_self"&gt;&lt;SPAN class="ph synph"&gt;&lt;VAR&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/configuration/general/asa-98-general-config/admin-management.html&lt;/VAR&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 20:09:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171270#M1075017</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-10-21T20:09:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to manage (ssh/https) a cisco asa fom vpn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171273#M1075018</link>
      <description>&lt;P&gt;This is already in my configuration:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;management-access mgmt2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;mgmt2 is an internal interface 10.160.223.250&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 20:12:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171273#M1075018</guid>
      <dc:creator>schnap</dc:creator>
      <dc:date>2020-10-21T20:12:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to manage (ssh/https) a cisco asa fom vpn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171303#M1075020</link>
      <description>&lt;P&gt;do this&amp;nbsp;&lt;/P&gt;&lt;P&gt;manage-access inside&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;try this and let me know result.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 21:47:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171303#M1075020</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2020-10-21T21:47:38Z</dc:date>
    </item>
    <item>
      <title>Re: How to manage (ssh/https) a cisco asa fom vpn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171325#M1075022</link>
      <description>&lt;P&gt;What do you mean "&lt;SPAN&gt;...this is routed to a switch..."?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Did you make sure NAT exemption is applied for the traffic between the management interface and AnyConnect clients pool?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 22:18:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171325#M1075022</guid>
      <dc:creator>EU UC Support</dc:creator>
      <dc:date>2020-10-21T22:18:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to manage (ssh/https) a cisco asa fom vpn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171702#M1075042</link>
      <description>&lt;P&gt;These commands are already there and it's not working&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 11:48:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171702#M1075042</guid>
      <dc:creator>schnap</dc:creator>
      <dc:date>2020-10-22T11:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to manage (ssh/https) a cisco asa fom vpn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171710#M1075045</link>
      <description>&lt;P&gt;Things to check:&lt;/P&gt;
&lt;P&gt;1. make sure that your anyconnect subnet is included in the ssh and http commands.&amp;nbsp; for example ssh 1.1.1.0 255.255.255.0 mgmt2&lt;/P&gt;
&lt;P&gt;2. If you are using split tunneling, make sure that the mgmt2 subnet is included in the split tunnel ACL&lt;/P&gt;
&lt;P&gt;3. If you are using vpn filter, make sure there are no vpn filter ACL that are blocking this traffic in your anyconnect configuration&lt;/P&gt;
&lt;P&gt;4. make sure that you have a twice NAT / NAT exempt statement for the management traffic&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 11:57:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171710#M1075045</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-10-22T11:57:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to manage (ssh/https) a cisco asa fom vpn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171711#M1075046</link>
      <description>&lt;P&gt;Yes nat exemptions is there.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I connect in vpn to the public ip . I have multiple interface on the firewall port channel on interface and connected to a swith , for example vlan 500 is outside and vlan 400 mgmt2 that is my "inside interface" this passed through a switch&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 11:57:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171711#M1075046</guid>
      <dc:creator>schnap</dc:creator>
      <dc:date>2020-10-22T11:57:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to manage (ssh/https) a cisco asa fom vpn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171733#M1075049</link>
      <description>&lt;P&gt;Can you please post the sanitized configs for review?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 12:21:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171733#M1075049</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-22T12:21:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to manage (ssh/https) a cisco asa fom vpn anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171738#M1075050</link>
      <description>&lt;P&gt;Above two command there, that ok but are you sure managment is point to input not to management interface?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now use &lt;STRONG&gt;route-lookup&lt;/STRONG&gt; in NAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 12:28:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-manage-ssh-https-a-cisco-asa-fom-vpn-anyconnect/m-p/4171738#M1075050</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2020-10-22T12:28:13Z</dc:date>
    </item>
  </channel>
</rss>

