<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Concurrent SSH session in Cisco ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/concurrent-ssh-session-in-cisco-asa/m-p/3912161#M24865</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now what you've done is the right syntax , I haven't try to increase ssh session before but I always like to make use of possibility before concluding on the documentation direction.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your Configuration is only matching on TCP Port 22 according to your command, I wanted to just agreed this might be a deadlock stuff , but I had to think of the way ASA handle FTP traffic when in passive , and the way ASA handle traceroute as well. I believe you are familiar with the afore-mentioned protocol (FTP &amp;amp; Traceroute)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the case of FTP , when you check default inspection , you can see ASA is inspecting FTP but technically ASA will deny FTP in passive mode due to variation in outbound ports and inbound port ( check FTP order of operation on this)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the case of traceroute , cisco uses unix based whilst Window machine doesn't, the mode of manually placing exception for this protocol is different when it comes to where the traffic is been generated from. In IOS / UNIX based UDP is use as outbound and return traffic is TCP ( do you see different) , this is why traceroute packet get drop until you manually inspect this via MPF.&lt;/P&gt;&lt;P&gt;On Windows Machine it uses TCP as outbound and the return packet consist of two different ICMP code traffic.&lt;/P&gt;&lt;P&gt;With your configuration , even if this is not possible I guess you still haven't done the manual inspection properly in terms of what your class-map is matching or inspecting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The logic before using MPF is to check :&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;ASA logs via buffer or console when not production device&lt;/LI&gt;&lt;LI&gt;sh conn all&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The above guidance will tell you what is seen outbound and what is seen inbound , as we know ASA is stateful behaviour , it will expect the outbound traffic to be the same with inbound , but in the case of non standard protocol we need manually exception by looking into logs / connection details to get this right.&lt;/P&gt;&lt;P&gt;Please let see if this work....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 22 Aug 2019 09:03:19 GMT</pubDate>
    <dc:creator>Afolarin Omole</dc:creator>
    <dc:date>2019-08-22T09:03:19Z</dc:date>
    <item>
      <title>Concurrent SSH session in Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/concurrent-ssh-session-in-cisco-asa/m-p/3910327#M24831</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any way to increase the limit of 5 concurrent ssh sessions in a Cisco ASA ?&lt;/P&gt;&lt;P&gt;I have tried increasing the quota-management session limit but still the ssh sessions are limited to 5.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2019 16:41:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/concurrent-ssh-session-in-cisco-asa/m-p/3910327#M24831</guid>
      <dc:creator>NeWGuy1109</dc:creator>
      <dc:date>2019-08-19T16:41:00Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent SSH session in Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/concurrent-ssh-session-in-cisco-asa/m-p/3910622#M24836</link>
      <description>&lt;P&gt;I don't believe so.&lt;/P&gt;
&lt;P&gt;As noted in the other thread you posted on, the quota-management command doesn't change the ssh session limit per se.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2019 05:24:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/concurrent-ssh-session-in-cisco-asa/m-p/3910622#M24836</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-08-20T05:24:19Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent SSH session in Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/concurrent-ssh-session-in-cisco-asa/m-p/3911503#M24863</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/890979"&gt;@NeWGuy1109&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you try using the ASA MPF to set the connection , the syntax is straight forward just like the MQC in normal ios , here you can set maximum connection for ASA management.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;MQC syntax :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map to classify traffic flow&lt;/P&gt;&lt;P&gt;policy-map to action the classified traffic flow&lt;/P&gt;&lt;P&gt;service-policy to bind the above / implement it on the interesting interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know if this help .&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2019 11:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/concurrent-ssh-session-in-cisco-asa/m-p/3911503#M24863</guid>
      <dc:creator>Afolarin Omole</dc:creator>
      <dc:date>2019-08-21T11:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent SSH session in Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/concurrent-ssh-session-in-cisco-asa/m-p/3911925#M24864</link>
      <description>&lt;P&gt;It doesn't work even when using MPF. The limit for a single context ASA is 5 simultaneous ssh sessions. I believe the documentation suggesting otherwise is unclear in that it is meant for multiple context ASAs.&lt;/P&gt;
&lt;P&gt;I just labbed it and the limit does not change with "quota management-session 10" or even when doing:&lt;/P&gt;
&lt;PRE&gt;class-map type management MGMT_CMAP
match port tcp eq ssh
!
policy-map MGMT_PMAP
class MGMT_CMAP
  set connection conn-max 10
!
service-policy MGMT_PMAP interface inside&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2019 21:06:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/concurrent-ssh-session-in-cisco-asa/m-p/3911925#M24864</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-08-21T21:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent SSH session in Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/concurrent-ssh-session-in-cisco-asa/m-p/3912161#M24865</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now what you've done is the right syntax , I haven't try to increase ssh session before but I always like to make use of possibility before concluding on the documentation direction.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your Configuration is only matching on TCP Port 22 according to your command, I wanted to just agreed this might be a deadlock stuff , but I had to think of the way ASA handle FTP traffic when in passive , and the way ASA handle traceroute as well. I believe you are familiar with the afore-mentioned protocol (FTP &amp;amp; Traceroute)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the case of FTP , when you check default inspection , you can see ASA is inspecting FTP but technically ASA will deny FTP in passive mode due to variation in outbound ports and inbound port ( check FTP order of operation on this)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the case of traceroute , cisco uses unix based whilst Window machine doesn't, the mode of manually placing exception for this protocol is different when it comes to where the traffic is been generated from. In IOS / UNIX based UDP is use as outbound and return traffic is TCP ( do you see different) , this is why traceroute packet get drop until you manually inspect this via MPF.&lt;/P&gt;&lt;P&gt;On Windows Machine it uses TCP as outbound and the return packet consist of two different ICMP code traffic.&lt;/P&gt;&lt;P&gt;With your configuration , even if this is not possible I guess you still haven't done the manual inspection properly in terms of what your class-map is matching or inspecting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The logic before using MPF is to check :&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;ASA logs via buffer or console when not production device&lt;/LI&gt;&lt;LI&gt;sh conn all&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The above guidance will tell you what is seen outbound and what is seen inbound , as we know ASA is stateful behaviour , it will expect the outbound traffic to be the same with inbound , but in the case of non standard protocol we need manually exception by looking into logs / connection details to get this right.&lt;/P&gt;&lt;P&gt;Please let see if this work....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2019 09:03:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/concurrent-ssh-session-in-cisco-asa/m-p/3912161#M24865</guid>
      <dc:creator>Afolarin Omole</dc:creator>
      <dc:date>2019-08-22T09:03:19Z</dc:date>
    </item>
  </channel>
</rss>

