<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic asa847-k8.bin in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-enabling-ssh/m-p/2898681#M154998</link>
    <description>&lt;P&gt;asa847-k8.bin&lt;/P&gt;</description>
    <pubDate>Fri, 08 Apr 2016 15:54:58 GMT</pubDate>
    <dc:creator>douglas.mckee</dc:creator>
    <dc:date>2016-04-08T15:54:58Z</dc:date>
    <item>
      <title>ASA-5510 Enabling SSH</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-enabling-ssh/m-p/2898680#M154996</link>
      <description>&lt;P&gt;Good morning,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm trying to enable SSH on our ASA-5510 running the k8 file listed below. Using Cisco's configuration guide listed below I'm unable to create the crypto key because the "crypto key generate rsa modulus" command isn't showing up under config t. Does aaa local authentication need to be enabled first before this command will show up? Doesn't appear to be so since this is the 3rd step.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;hostname(config)# &lt;B class="cCN_CmdName" style="font-weight: bold;"&gt;crypto key generate rsa modulus&lt;/B&gt;&lt;SPAN style="color: black; font-style: italic; font-weight: normal;"&gt; &lt;/SPAN&gt;&lt;SPAN style="color: black; font-style: normal; font-weight: bold;"&gt;1024
&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;A name="wp1503890" style="text-decoration: none;" target="_blank"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="pEx1_Example1"&gt;
&lt;PRE class="prettyprint"&gt;hostname(config)# &lt;B class="cBold"&gt;write memory
&lt;/B&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;A name="wp1503894" style="text-decoration: none;" target="_blank"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="pEx1_Example1"&gt;
&lt;PRE class="prettyprint"&gt;hostname(config)# &lt;B class="cBold"&gt;aaa authentication ssh console LOCAL
&lt;/B&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;A name="wp1503895" style="text-decoration: none;" target="_blank"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="pEx1_Example1"&gt;
&lt;PRE class="prettyprint"&gt;WARNING: local database is empty! Use 'username' command to define local users.
&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;A name="wp1503899" style="text-decoration: none;" target="_blank"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="pEx1_Example1"&gt;
&lt;PRE class="prettyprint"&gt;hostname(config)# &lt;B class="cBold"&gt;username exampleuser1 password examplepassword1
&lt;/B&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;A name="wp1503903" style="text-decoration: none;" target="_blank"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="pEx1_Example1"&gt;
&lt;PRE class="prettyprint"&gt;hostname(config)# &lt;B class="cBold"&gt;ssh 192.168.1.2 255.255.255.255 inside
&lt;/B&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;A name="wp1503907" style="text-decoration: none;" target="_blank"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="pEx1_Example1"&gt;
&lt;PRE class="prettyprint"&gt;hostname(config)# &lt;B class="cBold"&gt;ssh timeout 30
&lt;/B&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;A name="wp1503908" style="text-decoration: none;" target="_blank"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="pEx1_Example1"&gt;
&lt;PRE class="prettyprint"&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;A name="wp1503912" style="text-decoration: none;" target="_blank"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;The following example shows how to allow all users on the 192.168.3.0 network to access the ASA on the inside interface:&lt;/P&gt;
&lt;P&gt;&lt;A name="wp1503916" style="text-decoration: none;" target="_blank"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="pEx1_Example1"&gt;
&lt;PRE class="prettyprint"&gt;hostname(config)# &lt;B class="cBold"&gt;ssh 192.168.3.0 255.255.255.0 inside&lt;/B&gt;&lt;/PRE&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:35:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-enabling-ssh/m-p/2898680#M154996</guid>
      <dc:creator>douglas.mckee</dc:creator>
      <dc:date>2019-03-12T07:35:51Z</dc:date>
    </item>
    <item>
      <title>asa847-k8.bin</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-enabling-ssh/m-p/2898681#M154998</link>
      <description>&lt;P&gt;asa847-k8.bin&lt;/P&gt;</description>
      <pubDate>Fri, 08 Apr 2016 15:54:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-enabling-ssh/m-p/2898681#M154998</guid>
      <dc:creator>douglas.mckee</dc:creator>
      <dc:date>2016-04-08T15:54:58Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-enabling-ssh/m-p/2898682#M154999</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You need to enable the Cisco ASA 3DES/AES License for this to work.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Just do a show version and it would be showing disabled.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can&amp;nbsp;obtain it using the following link:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/document/67701/asa-versions-image-names-and-licensing#How_to_obtain_strong-crypto_licenses_for_ASA&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Apr 2016 17:14:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-enabling-ssh/m-p/2898682#M154999</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-04-08T17:14:55Z</dc:date>
    </item>
  </channel>
</rss>

