<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Upgrade, lost ssh access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5119617#M1113086</link>
    <description>&lt;P&gt;tunnels use pre-shared keys. so I should be good to rekey?&lt;/P&gt;</description>
    <pubDate>Wed, 29 May 2024 14:49:48 GMT</pubDate>
    <dc:creator>zietgiestt</dc:creator>
    <dc:date>2024-05-29T14:49:48Z</dc:date>
    <item>
      <title>ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5119558#M1113083</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I just upgraded a cisco ASA 5506 from 9.6-9.16(4)57 and I cannot ssh into it any longer.&lt;/P&gt;&lt;P&gt;Get an error: "server unexpectedly closed the network connection"&lt;/P&gt;&lt;P&gt;I can access via asdm.&lt;/P&gt;&lt;P&gt;I have ssh enabled and I have ssh allowed form only 2 machines (a local server and my laptop).&lt;/P&gt;&lt;P&gt;I'm thinking I need to generate a new crypto key.&lt;/P&gt;&lt;P&gt;My question is, if I do generate a new cry key, will that break my ipsec tunnels?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 13:51:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5119558#M1113083</guid>
      <dc:creator>zietgiestt</dc:creator>
      <dc:date>2024-05-29T13:51:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5119615#M1113085</link>
      <description>&lt;P&gt;Tunnel use rsa as auth?&lt;/P&gt;
&lt;P&gt;If not I dont see anything between re-key the ssh and ipsec vpn&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 14:47:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5119615#M1113085</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-29T14:47:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5119617#M1113086</link>
      <description>&lt;P&gt;tunnels use pre-shared keys. so I should be good to rekey?&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 14:49:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5119617#M1113086</guid>
      <dc:creator>zietgiestt</dc:creator>
      <dc:date>2024-05-29T14:49:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5119622#M1113088</link>
      <description>&lt;P&gt;For my view there is no issue at all' if you&amp;nbsp; want I can check by lab abd update you.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 14:52:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5119622#M1113088</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-29T14:52:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5119639#M1113093</link>
      <description>&lt;P&gt;I don't think that would be necessary but thanks for offering.&lt;/P&gt;&lt;P&gt;would you agree with me upgrading to such a jump would require a rekey to regain ssh access, due to the deprecated encryption not allowed on 9.16?&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 15:03:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5119639#M1113093</guid>
      <dc:creator>zietgiestt</dc:creator>
      <dc:date>2024-05-29T15:03:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5119803#M1113101</link>
      <description>&lt;P&gt;You should not NORMALLY have to generate a new RSA key (which is used for ssh, completely separate from the preshared keys used by any IPsec VPNs).&lt;/P&gt;
&lt;P&gt;However, there is a change in behavior noted with 9.16 specifically as follows:&lt;/P&gt;
&lt;P&gt;&lt;STRONG class="ph b"&gt;" SSH host key action required in 9.16(1)&lt;/STRONG&gt;—In addition to RSA, we added support for the EDDSA and ECDSA host keys for SSH. The ASA tries to use keys in the following order if they exist: EDDSA, ECDSA, and then RSA. When you upgrade to 9.16(1), the ASA will fall back to using the existing RSA key. However, we recommend that you generate higher-security keys as soon as possible using the &lt;SPAN&gt;&lt;SPAN class="keyword kwd"&gt;crypto key generate&lt;/SPAN&gt; {&lt;SPAN class="keyword kwd"&gt;eddsa&lt;/SPAN&gt; | &lt;SPAN class="keyword kwd"&gt;ecdsa&lt;/SPAN&gt;} &lt;/SPAN&gt; command. Moreover, if you explicitly configure the ASA to use the RSA key with the &lt;SPAN&gt;&lt;SPAN class="keyword kwd"&gt;ssh key-exchange hostkey rsa&lt;/SPAN&gt; &lt;/SPAN&gt; command, you must generate a key that is 2048 bits or higher. For upgrade compatibility, the ASA will use smaller RSA host keys only when the default host key setting is used. RSA support will be removed in a later release."&lt;/P&gt;
&lt;P&gt;Reference: &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa916/release/notes/asarn916.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa916/release/notes/asarn916.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 16:49:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5119803#M1113101</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-05-29T16:49:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5119920#M1113106</link>
      <description>&lt;P&gt;Thanks for the replies MHM &amp;amp; Marvin.&lt;/P&gt;&lt;P&gt;I figured it out...had an too old a version of putty. updated my putty client and connected just fine.&lt;/P&gt;&lt;P&gt;I guess the silver lining is I have better ciphers now that I've changed all my ssh settings.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks for the help...&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 19:18:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5119920#M1113106</guid>
      <dc:creator>zietgiestt</dc:creator>
      <dc:date>2024-05-29T19:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5119930#M1113109</link>
      <description>&lt;P&gt;Thanks alot for update us&lt;/P&gt;
&lt;P&gt;I was waiting run some lab test change cipher with same rsa key.&lt;/P&gt;
&lt;P&gt;But you short the way.&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have a nice day&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 19:23:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5119930#M1113109</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-29T19:23:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5120554#M1113130</link>
      <description>&lt;P&gt;Good to hear you are back in via ssh. Besides supporting newer algorithms, any version of Putty before earlier this year (0.80 or older) should be updated in any event due to a critical vulnerability.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2024-31497" target="_blank"&gt;https://nvd.nist.gov/vuln/detail/CVE-2024-31497&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 12:40:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5120554#M1113130</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-05-30T12:40:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5224640#M1117576</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;&lt;P&gt;I was trying to understand what fixes this issue.&amp;nbsp; I upgraded from 9.12.4 to 9.16.4 and ssh worked at first and then all I get is&amp;nbsp;Connection reset by peer.&amp;nbsp; I can use ASDM just fine.&amp;nbsp; It's the ssh that fails now.&lt;BR /&gt;This is what I have for ssh config.&amp;nbsp;&lt;/P&gt;&lt;P&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;ssh key-exchange hostkey rsa&lt;BR /&gt;ssh x.x.x.x 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;This is the command I ran after zeroing the rsa key.&lt;BR /&gt;crypto key generate rsa modulus 3072 noconfirm.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I have tried this with ecdsa too using this command&lt;BR /&gt;crypto key generate ecdsa elliptic-curve 384 noconfirm&lt;/P&gt;&lt;P&gt;All commands have been run via cli in ASDM.&lt;/P&gt;&lt;P&gt;I am using both Putty and SecureCRT.&lt;/P&gt;&lt;P&gt;Help if you can.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ken&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2024 21:31:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5224640#M1117576</guid>
      <dc:creator>kcousino123</dc:creator>
      <dc:date>2024-11-14T21:31:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5224861#M1117589</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1273163"&gt;@kcousino123&lt;/a&gt; did you check your versions? Old Putty or SecureCRT can both fail to support the latest ssh kex algorithms.&lt;/P&gt;
&lt;P&gt;I also see you allow ssh from only one address on the outside. Is that the source where you see the issue and are you trying to ssh to the outside interface?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 12:08:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5224861#M1117589</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-11-15T12:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5224988#M1117595</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;, I do have current versions of both software running.&amp;nbsp; I have multiple public IPs for this access but only showed one for the chat.&amp;nbsp; Also, for the testing, I have it open to 0.0.0.0.&amp;nbsp; I am trying to connect to the outside interface.&amp;nbsp; Here is the really weird thing, I actually upgraded 6 5506 firewalls, and with 5 SSH doesn't work now but for one it still works.&amp;nbsp; I compared those configs and there isn't anything different.&amp;nbsp; I wondered if there was a better version of the software that I should migrate to or is this issue the same moving forward.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 15:31:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5224988#M1117595</guid>
      <dc:creator>kcousino123</dc:creator>
      <dc:date>2024-11-15T15:31:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5225201#M1117602</link>
      <description>&lt;P&gt;Do you have any other NATs that possibly use the interface address for port 22?&lt;/P&gt;</description>
      <pubDate>Sat, 16 Nov 2024 05:46:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5225201#M1117602</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-11-16T05:46:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5225474#M1117605</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;, no I don't have any other NATs.&amp;nbsp; One of the things I wondered is if it might have something to do with the chipset version on the firewall.&lt;BR /&gt;Do you know if this issue is on newer version of the software?&lt;/P&gt;</description>
      <pubDate>Sun, 17 Nov 2024 01:26:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5225474#M1117605</guid>
      <dc:creator>kcousino123</dc:creator>
      <dc:date>2024-11-17T01:26:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5225751#M1117612</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1273163"&gt;@kcousino123&lt;/a&gt; please check the following and share the output on one of your non-working firewalls:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;CODE class="mv6bHd"&gt;show asp table socket | include ssh&lt;/CODE&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Nov 2024 08:08:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5225751#M1117612</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-11-18T08:08:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5225933#M1117622</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;, I ran that command and received nothing in response.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Nov 2024 14:25:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5225933#M1117622</guid>
      <dc:creator>kcousino123</dc:creator>
      <dc:date>2024-11-18T14:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5225941#M1117623</link>
      <description>&lt;P&gt;Sorry,It should be:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;CODE class="mv6bHd"&gt;show asp table socket | include 22&lt;/CODE&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Nov 2024 14:37:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5225941#M1117623</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-11-18T14:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5225951#M1117625</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;I ran that one and get this.&lt;/P&gt;&lt;P&gt;TCP 12338188 LISTEN x.x.x.x:22 0.0.0.0:* "x.x.x.x is my outside public"&lt;BR /&gt;TCP 13bed638 LISTEN x.x.x.x:22 0.0.0.0:* "x.x.x.x is my inside private"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Nov 2024 14:57:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5225951#M1117625</guid>
      <dc:creator>kcousino123</dc:creator>
      <dc:date>2024-11-18T14:57:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5226825#M1117689</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;, I did some testing this morning.&amp;nbsp; I downgraded the firewall back to the previous version and SSH started working as expected.&amp;nbsp; I then re-upgraded to the 9.16.4 version.&amp;nbsp; After rebooting I was able to use SSH as expected.&amp;nbsp; The really weird twist, is a couple hours later and SSH doesn't work again.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 15:01:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5226825#M1117689</guid>
      <dc:creator>kcousino123</dc:creator>
      <dc:date>2024-11-20T15:01:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade, lost ssh access</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5226841#M1117692</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1273163"&gt;@kcousino123&lt;/a&gt; that sounds suspiciously like some system is logging in remotely and tying up all the available ssh lines. You can check this with "show ssh sessions" command. The default allows 5 ssh sessions to be active at any one time. (Similar to "line vty 0 4" in IOS devices.)&lt;/P&gt;
&lt;P&gt;See also: &lt;A href="https://www.tunnelsup.com/how-to-show-and-clear-user-sessions-on-a-cisco-asa/" target="_blank"&gt;https://www.tunnelsup.com/how-to-show-and-clear-user-sessions-on-a-cisco-asa/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 15:52:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-lost-ssh-access/m-p/5226841#M1117692</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-11-20T15:52:49Z</dc:date>
    </item>
  </channel>
</rss>

