<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Mahesh,You say a switch but in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735807#M192278</link>
    <description>&lt;P&gt;Mahesh,&lt;/P&gt;&lt;P&gt;You say a switch but actually an ASA firewall, can you share more of the ASA configuration and a show access-list command&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Richard.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 29 Aug 2015 05:52:21 GMT</pubDate>
    <dc:creator>Richard Bradfield</dc:creator>
    <dc:date>2015-08-29T05:52:21Z</dc:date>
    <item>
      <title>Unable to ssh switch from PC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735806#M192277</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to ssh from PC to Switch.&lt;/P&gt;&lt;P&gt;PC IP 192.168.2.5&lt;/P&gt;&lt;P&gt;Switch IP 10.31.2.34&lt;/P&gt;&lt;P&gt;log shows&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Aug 28 2015 21:10:41: %ASA-6-302013: Built outbound TCP connection 673 for MGMT:10.31.2.34/22 (10.31.2.34/22) to VISITOR:192.168.2.5/1556 (192.168.2.5/1556)&lt;BR /&gt;Aug 28 2015 21:10:41: %ASA-6-302014: Teardown TCP connection 673 for MGMT:10.31.2.34/22 to VISITOR:192.168.2.5/1556 duration 0:00:00 bytes 0 TCP Reset-I&lt;BR /&gt;Aug 28 2015 21:10:44: %ASA-6-106015: Deny TCP (no connection) from 192.168.2.5/1556 to 10.31.2.34/22 flags RST&amp;nbsp; on interface VISITOR&lt;BR /&gt;Aug 28 2015 21:10:44: %ASA-6-302013: Built outbound TCP connection 675 for MGMT:10.31.2.34/22 (10.31.2.34/22) to VISITOR:192.168.2.5/1556 (192.168.2.5/1556)&lt;BR /&gt;Aug 28 2015 21:10:44: %ASA-6-302014: Teardown TCP connection 675 for MGMT:10.31.2.34/22 to VISITOR:192.168.2.5/1556 duration 0:00:00 bytes 0 TCP Reset-I&lt;BR /&gt;Aug 28 2015 21:10:47: %ASA-6-106015: Deny TCP (no connection) from 192.168.2.5/1556 to 10.31.2.34/22 flags RST&amp;nbsp; on interface VISITOR&lt;BR /&gt;Aug 28 2015 21:10:50: %ASA-6-302013: Built outbound TCP connection 677 for MGMT:10.31.2.34/22 (10.31.2.34/22) to VISITOR:192.168.2.5/1556 (192.168.2.5/1556)&lt;BR /&gt;Aug 28 2015 21:10:50: %ASA-6-302014: Teardown TCP connection 677 for MGMT:10.31.2.34/22 to VISITOR:192.168.2.5/1556 duration 0:00:00 bytes 0 TCP Reset-I&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Confi g&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;nameif MGMT&lt;BR /&gt;&amp;nbsp;security-level 10&lt;BR /&gt;&amp;nbsp;ip address 10.31.2.33 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;nameif VISITOR&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ACL is there to allow ssh to 10.31.2.34 but i see no hit counts.&lt;/P&gt;&lt;P&gt;Packet tracer shows that ssh is allowed.&lt;/P&gt;&lt;P&gt;Also from PC i can ping the IP 10.31.2.34 but ssh does not work is this due to design?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735806#M192277</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T06:31:00Z</dc:date>
    </item>
    <item>
      <title>Mahesh,You say a switch but</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735807#M192278</link>
      <description>&lt;P&gt;Mahesh,&lt;/P&gt;&lt;P&gt;You say a switch but actually an ASA firewall, can you share more of the ASA configuration and a show access-list command&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Richard.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Aug 2015 05:52:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735807#M192278</guid>
      <dc:creator>Richard Bradfield</dc:creator>
      <dc:date>2015-08-29T05:52:21Z</dc:date>
    </item>
    <item>
      <title> Its not ASA it is switch</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735808#M192279</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its not ASA it is switch directly connected to ASA.&lt;/P&gt;&lt;P&gt;ASA config&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list MGMT_access_in extended permit ip any any&lt;BR /&gt;access-list VISITOR_access_in extended permit udp 192.168.2.0 255.255.255.0 object-group DM_INLINE_NETWORK_1 eq domain&lt;BR /&gt;access-list VISITOR_access_in extended permit tcp 192.168.2.0 255.255.255.0 any eq www&lt;BR /&gt;access-list VISITOR_access_in extended permit tcp 192.168.2.0 255.255.255.0 any eq https&lt;BR /&gt;access-list VISITOR_access_in extended permit icmp 192.168.2.0 255.255.255.0 any&lt;BR /&gt;access-list VISITOR_access_in extended permit tcp 192.168.2.0 255.255.255.0 object-group DM_INLINE_NETWORK_2 eq ssh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Sat, 29 Aug 2015 06:52:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735808#M192279</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2015-08-29T06:52:26Z</dc:date>
    </item>
    <item>
      <title>the Reset-I in your logs</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735809#M192280</link>
      <description>&lt;P&gt;the Reset-I in your logs indicates that the reset is coming from the VISITOR interface.&amp;nbsp; Are you sure that the switch is correctly configured for SSH access?&lt;/P&gt;&lt;P&gt;Also could you post all your NAT configuration.&amp;nbsp; I have also seen this issue being cause by incorrectly configured NAT statements.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sat, 29 Aug 2015 18:44:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735809#M192280</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2015-08-29T18:44:08Z</dc:date>
    </item>
    <item>
      <title> Hi Marius, Switch is</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735810#M192281</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Switch is allowing the ssh.&lt;/P&gt;&lt;P&gt;Here is all NAT config&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;BR /&gt;nat (MGMT) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (VISITOR) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (WLC_ASA_5505,MGMT) 10.0.0.0 10.0.0.0 netmask 255.0.0.0&lt;BR /&gt;static (VISITOR,MGMT) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;BR /&gt;static (VISITOR,WLC_ASA_5505) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Sat, 29 Aug 2015 20:11:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735810#M192281</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2015-08-29T20:11:46Z</dc:date>
    </item>
    <item>
      <title>what are you trying to</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735811#M192282</link>
      <description>&lt;P&gt;what are you trying to accomplish with this NAT statement:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;static (VISITOR,MGMT) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;I believe your issues are coming freom incorrect NAT usage.&amp;nbsp; The above NAT statement translates a destination address of 192.168.2.0 to itself.&amp;nbsp; This is an incorrect usase of NAT for the version you are running.&amp;nbsp; This should be a NAT 0 statement.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list NAT0 extended permit ip &amp;lt;VISITOR subnet&amp;gt; &amp;lt;MGMT subnet&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (VISITOR) 0 access-list NAT0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;You could probably solve this issue by using the no nat-control command and removing your current static nat entries.&amp;nbsp; Though then you would need to be more specific with your nat (MGMT) and nat (VISITOR) subnets and not have them as 0.0.0.0 0.0.0.0.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Aug 2015 06:57:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735811#M192282</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2015-08-30T06:57:18Z</dc:date>
    </item>
    <item>
      <title> here is setup WLC-----</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735812#M192289</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here is setup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;WLC------switch-----------ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;WLC Management IP 10.31.2.35&lt;/P&gt;&lt;P&gt;Switch Management IP 10.31.2.34&lt;/P&gt;&lt;P&gt;Switch has default gateway to the ASA IP--10.31.2.33&lt;/P&gt;&lt;P&gt;With that NAT I am trying to reach the 10.31.2.0 subnet from user IP 192.168.2.0.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now I have removed that NAT but I am still able to ping and ssh to WLC IP 10.31.2.35?&lt;/P&gt;&lt;P&gt;Can you please tell how this is happening without any NAT from Visitor to Management interface of ASA ?&lt;/P&gt;&lt;P&gt;I put the no nat as you said&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (VISITOR) 0 access-list NAT0&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;still same issue&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Aug 30 2015 05:51:56: %ASA-6-302013: Built outbound TCP connection 40004 for MGMT:10.31.2.34/22 (10.31.2.34/22) to VISITOR:192.168.2.28/1498 (192.168.2.28/1498)&lt;BR /&gt;Aug 30 2015 05:51:56: %ASA-6-302014: Teardown TCP connection 40004 for MGMT:10.31.2.34/22 to VISITOR:192.168.2.28/1498 duration 0:00:00 bytes 0 TCP Reset-I&lt;BR /&gt;Aug 30 2015 05:51:58: %ASA-6-106015: Deny TCP (no connection) from 192.168.2.28/1498 to 10.31.2.34/22 flags RST&amp;nbsp; on interface VISITOR&lt;BR /&gt;Aug 30 2015 05:51:59: %ASA-6-302013: Built outbound TCP connection 40007 for MGMT:10.31.2.34/22 (10.31.2.34/22) to VISITOR:192.168.2.28/1498 (192.168.2.28/1498)&lt;BR /&gt;Aug 30 2015 05:51:59: %ASA-6-302014: Teardown TCP connection 40007 for MGMT:10.31.2.34/22 to VISITOR:192.168.2.28/1498 duration 0:00:00 bytes 0 TCP Reset-I&lt;BR /&gt;Aug 30 2015 05:52:02: %ASA-6-106015: Deny TCP (no connection) from 192.168.2.28/1498 to 10.31.2.34/22 flags RST&amp;nbsp; on interface VISITOR&lt;BR /&gt;Aug 30 2015 05:52:05: %ASA-6-302013: Built outbound TCP connection 40009 for MGMT:10.31.2.34/22 (10.31.2.34/22) to VISITOR:192.168.2.28/1498 (192.168.2.28/1498)&lt;BR /&gt;Aug 30 2015 05:52:05: %ASA-6-302014: Teardown TCP connection 40009 for MGMT:10.31.2.34/22 to VISITOR:192.168.2.28/1498 duration 0:00:00 bytes 0 TCP Reset-I&lt;BR /&gt;Aug 30 2015 05:52:10: %ASA-6-106015: Deny TCP (no connection) from 192.168.2.28/1498 to 10.31.2.34/22 flags RST&amp;nbsp; on interface VISITOR&lt;BR /&gt;Aug 30 2015 05:51:56: %ASA-6-302013: Built outbound TCP connection 40004 for MGMT:10.31.2.34/22 (10.31.2.34/22) to VISITOR:192.168.2.28/1498 (192.168.2.28/1498)&lt;BR /&gt;Aug 30 2015 05:51:56: %ASA-6-302014: Teardown TCP connection 40004 for MGMT:10.31.2.34/22 to VISITOR:192.168.2.28/1498 duration 0:00:00 bytes 0 TCP Reset-I&lt;BR /&gt;Aug 30 2015 05:51:58: %ASA-6-106015: Deny TCP (no connection) from 192.168.2.28/1498 to 10.31.2.34/22 flags RST&amp;nbsp; on interface VISITOR&lt;BR /&gt;Aug 30 2015 05:51:59: %ASA-6-302013: Built outbound TCP connection 40007 for MGMT:10.31.2.34/22 (10.31.2.34/22) to VISITOR:192.168.2.28/1498 (192.168.2.28/1498)&lt;BR /&gt;Aug 30 2015 05:51:59: %ASA-6-302014: Teardown TCP connection 40007 for MGMT:10.31.2.34/22 to VISITOR:192.168.2.28/1498 duration 0:00:00 bytes 0 TCP Reset-I&lt;BR /&gt;Aug 30 2015 05:52:02: %ASA-6-106015: Deny TCP (no connection) from 192.168.2.28/1498 to 10.31.2.34/22 flags RST&amp;nbsp; on interface VISITOR&lt;BR /&gt;Aug 30 2015 05:52:05: %ASA-6-302013: Built outbound TCP connection 40009 for MGMT:10.31.2.34/22 (10.31.2.34/22) to VISITOR:192.168.2.28/1498 (192.168.2.28/1498)&lt;BR /&gt;Aug 30 2015 05:52:05: %ASA-6-302014: Teardown TCP connection 40009 for MGMT:10.31.2.34/22 to VISITOR:192.168.2.28/1498 duration 0:00:00 bytes 0 TCP Reset-I&lt;BR /&gt;Aug 30 2015 05:52:10: %ASA-6-106015: Deny TCP (no connection) from 192.168.2.28/1498 to 10.31.2.34/22 flags RST&amp;nbsp; on interface VISITOR&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also if I do no nat control then how would visitor subnet access the internet?&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Aug 2015 12:02:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735812#M192289</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2015-08-30T12:02:56Z</dc:date>
    </item>
    <item>
      <title>Did you define the NAT0</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735813#M192291</link>
      <description>&lt;P&gt;Did you define the NAT0 access list?&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Also if I do no nat control then how would visitor subnet access the internet?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;nat-control only tells the ASA that it REQUIRES an ACL to allow traffic between interfaces.&amp;nbsp; Removing it does not prevent NAT.&amp;nbsp; As long as you have a dynamic NAT for internet traffic you are fine for internet access.&lt;/P&gt;&lt;P&gt;Could you please provide your full running config for your ASA.&amp;nbsp; Remove any public IPs and passwords.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 30 Aug 2015 19:11:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735813#M192291</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2015-08-30T19:11:04Z</dc:date>
    </item>
    <item>
      <title>yes i define nat 0.here is</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735814#M192292</link>
      <description>&lt;P&gt;yes i define nat 0.&lt;/P&gt;&lt;P&gt;here is full config&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ASA5520# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.0(4)&lt;BR /&gt;!&lt;BR /&gt;hostname ASA5520&lt;/P&gt;&lt;P&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;nameif MGMT&lt;BR /&gt;&amp;nbsp;security-level 10&lt;BR /&gt;&amp;nbsp;ip address 10.31.2.33 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;description Connection to ISP SHAW&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;nameif WLC_ASA_5505&lt;BR /&gt;&amp;nbsp;security-level 67&lt;BR /&gt;&amp;nbsp;ip address 10.255.255.2 255.255.255.252&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;nameif VISITOR&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone MST -7&lt;BR /&gt;clock summer-time MST recurring&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 64.59.144.19&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object host 4.2.2.2&lt;BR /&gt;&amp;nbsp;network-object host 64.59.144.19&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;&amp;nbsp;network-object host 10.31.2.34&lt;BR /&gt;&amp;nbsp;network-object host 10.31.2.35&lt;BR /&gt;&amp;nbsp;network-object host 10.31.2.37&lt;BR /&gt;network-object host 10.255.255.1&lt;BR /&gt;access-list MGMT_access_in extended permit ip any any&lt;BR /&gt;access-list VISITOR_access_in extended permit udp 192.168.2.0 255.255.255.0 object-group DM_INLINE_NETWORK_1 eq domain&lt;BR /&gt;access-list VISITOR_access_in extended permit tcp 192.168.2.0 255.255.255.0 any eq www&lt;BR /&gt;access-list VISITOR_access_in extended permit tcp 192.168.2.0 255.255.255.0 any eq https&lt;BR /&gt;access-list VISITOR_access_in extended permit icmp 192.168.2.0 255.255.255.0 any&lt;BR /&gt;access-list VISITOR_access_in extended permit tcp 192.168.2.0 255.255.255.0 object-group DM_INLINE_NETWORK_2 eq ssh&lt;BR /&gt;access-list NAT0 extended permit ip 192.168.2.0 255.255.255.0 10.31.2.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffer-size 567890&lt;BR /&gt;logging buffered informational&lt;BR /&gt;logging history informational&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu MGMT 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu WLC_ASA_5505 1500&lt;BR /&gt;mtu VISITOR 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-613.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat-control&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;BR /&gt;nat (MGMT) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (VISITOR) 0 access-list NAT0&lt;BR /&gt;nat (VISITOR) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (WLC_ASA_5505,MGMT) 10.0.0.0 10.0.0.0 netmask 255.0.0.0&lt;BR /&gt;static (VISITOR,WLC_ASA_5505) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;BR /&gt;access-group MGMT_access_in in interface MGMT&lt;BR /&gt;access-group VISITOR_access_in in interface VISITOR&lt;BR /&gt;route WLC_ASA_5505 10.0.0.0 255.255.255.0 10.255.255.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.0.0.0 255.255.255.0 WLC_ASA_5505&lt;BR /&gt;http 192.168.2.0 255.255.255.0 VISITOR&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;BR /&gt;ssh 10.0.0.0 255.255.255.0 WLC_ASA_5505&lt;BR /&gt;ssh 192.168.2.0 255.255.255.0 VISITOR&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.2.4-192.168.2.61 VISITOR&lt;BR /&gt;dhcpd dns 64.59.144.19 interface VISITOR&lt;BR /&gt;dhcpd enable VISITOR&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 136.159.2.254 source outside&lt;BR /&gt;ntp server 128.100.56.135 source outside prefer&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:03ff1b71e63cf283ab4d7a146dfc367c&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Strange thing is that i can ssh 10.31.2.35 which is WLC IP but not switch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Sun, 30 Aug 2015 20:01:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735814#M192292</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2015-08-30T20:01:17Z</dc:date>
    </item>
    <item>
      <title>If you can ssh to 10.31.2.35</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735815#M192293</link>
      <description>&lt;P&gt;If you can ssh to 10.31.2.35 but not 10.31.2.34, I suggest you take a look at the SSH and VTY configuration on the switch.&amp;nbsp; Also check if there are restrictions that have been added to the control-plane.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Aug 2015 20:37:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735815#M192293</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2015-08-30T20:37:03Z</dc:date>
    </item>
    <item>
      <title>i can ssh to switch IP 192</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735816#M192294</link>
      <description>&lt;P&gt;i can ssh to switch IP 192.168.2.2 but not 10.31.2.34 so that tells me that ssh config&lt;/P&gt;&lt;P&gt;on switch is correct.&lt;/P&gt;&lt;P&gt;There are no restrictions on switch.It is layer 2 switch with default gateway pointing to&lt;/P&gt;&lt;P&gt;ASA 10.31.2.33&lt;/P&gt;&lt;P&gt;below is config of switch&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;ip ssh time-out 60&lt;BR /&gt;ip ssh authentication-retries 5&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/1&lt;BR /&gt;&amp;nbsp;description Connection to ASA 5510 Eth0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/2&lt;BR /&gt;&amp;nbsp;description Connection to ASA 5510 Eth0/3&lt;BR /&gt;&amp;nbsp;switchport access vlan 361&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/3&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/4&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/5&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/6&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/7&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/8&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/9&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/10&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/11&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/12&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/13&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/14&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/15&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/16&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/17&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/18&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/19&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/20&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/21&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/22&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/23&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/24&lt;BR /&gt;&amp;nbsp;description Connection_to_WAP&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/1&lt;BR /&gt;&amp;nbsp;description WLC_P1&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/2&lt;BR /&gt;&amp;nbsp;description WLC_P2&lt;BR /&gt;&amp;nbsp;switchport access vlan 361&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;no ip mroute-cache&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;ip address 10.31.2.34 255.255.255.0&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;no ip mroute-cache&lt;BR /&gt;!&lt;BR /&gt;interface Vlan361&lt;BR /&gt;&amp;nbsp;ip address 192.168.2.2 255.255.255.0&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;no ip mroute-cache&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 10.31.2.33&lt;BR /&gt;ip classless&lt;BR /&gt;ip http server&lt;BR /&gt;ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;login local&lt;BR /&gt;&amp;nbsp;transport input telnet ssh&lt;BR /&gt;&amp;nbsp;transport output ssh&lt;BR /&gt;line vty 5 15&lt;BR /&gt;&amp;nbsp;login local&lt;BR /&gt;&amp;nbsp;transport input telnet ssh&lt;BR /&gt;&amp;nbsp;transport output ssh&lt;BR /&gt;!&lt;BR /&gt;ntp clock-period 36029625&lt;BR /&gt;ntp server 128.100.56.135 prefer&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Sun, 30 Aug 2015 22:10:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735816#M192294</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2015-08-30T22:10:05Z</dc:date>
    </item>
    <item>
      <title>What model switch is it? </title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735817#M192295</link>
      <description>&lt;P&gt;What model switch is it?&amp;nbsp; Most L2 switches only support 1 active management VLAN interface.&amp;nbsp; I think that might the problem you are facing.&amp;nbsp; what is the output of &lt;STRONG&gt;show ip int bri&lt;/STRONG&gt; showing you for interface vlan2?&lt;/P&gt;&lt;P&gt;Besides, If this was aL3 switch, traffic would never go through the ASA but be routed directly by the switch.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Mon, 31 Aug 2015 19:05:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735817#M192295</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2015-08-31T19:05:44Z</dc:date>
    </item>
    <item>
      <title> here is infoSwitch#sh</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735818#M192297</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here is info&lt;/P&gt;&lt;P&gt;Switch#sh inventory&lt;BR /&gt;NAME: "1", DESCR: "WS-C3750-24TS"&lt;BR /&gt;PID: WS-C3750-24TS-E&amp;nbsp;&amp;nbsp; , VID: F0&amp;nbsp;&amp;nbsp; , SN: CAT0832X1GX&lt;/P&gt;&lt;P&gt;NAME: "GigabitEthernet1/0/1", DESCR: "1000BaseSX SFP"&lt;BR /&gt;PID: Unspecified&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; , VID:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; , SN: FNS111725W2&lt;/P&gt;&lt;P&gt;NAME: "GigabitEthernet1/0/2", DESCR: "1000BaseSX SFP"&lt;BR /&gt;PID: Unspecified&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; , VID:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; , SN: FNS0928H4EY&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Switch#sh ip int brief&lt;BR /&gt;Interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP-Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; OK? Method Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol&lt;BR /&gt;Vlan1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES NVRAM&amp;nbsp; administratively down down&lt;BR /&gt;Vlan2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.31.2.34&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES NVRAM&amp;nbsp; up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;BR /&gt;Vlan361&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.2.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES NVRAM&amp;nbsp; up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;BR /&gt;FastEthernet1/0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;BR /&gt;FastEthernet1/0/2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;BR /&gt;FastEthernet1/0/3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/7&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/12&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/13&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/14&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/15&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/16&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/17&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/18&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/19&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/20&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/21&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/22&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/23&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; down&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; down&lt;BR /&gt;FastEthernet1/0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;BR /&gt;GigabitEthernet1/0/1&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;BR /&gt;GigabitEthernet1/0/2&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;BR /&gt;Switch#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Tue, 01 Sep 2015 03:05:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735818#M192297</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2015-09-01T03:05:29Z</dc:date>
    </item>
    <item>
      <title>If you change the IP on the</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735819#M192299</link>
      <description>&lt;P&gt;If you change the IP on the PC to be in the&amp;nbsp;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;10.31.2.0/24 subnet, and configure another port to be in that VLAN, are you able to ping 10.31.2.34?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;--&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Sep 2015 07:54:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735819#M192299</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2015-09-01T07:54:02Z</dc:date>
    </item>
    <item>
      <title>Ping is not issue i can ping</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735820#M192300</link>
      <description>&lt;P&gt;Ping is not issue i can ping the switch IP 10.31.2.34 from PC with 192.168.2.x subnet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But i will to test as per you later today.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Sep 2015 16:19:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-switch-from-pc/m-p/2735820#M192300</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2015-09-01T16:19:30Z</dc:date>
    </item>
  </channel>
</rss>

