<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSH issue on inside interface. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-issue-on-inside-interface/m-p/2247507#M346192</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well first of I would look at the monitor logging section while attempting the SSH connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that doesnt help then you always have the option to use &lt;STRONG&gt;"debug ssh"&lt;/STRONG&gt; and monitor the output through ASDM or a Telnet management connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above output would seem to indicate that the ASA is listening on the port TCP/22 on the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you just getting timeout for the SSH connection or are you getting any prompts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 18 Jul 2013 14:17:11 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-07-18T14:17:11Z</dc:date>
    <item>
      <title>SSH issue on inside interface.</title>
      <link>https://community.cisco.com/t5/network-security/ssh-issue-on-inside-interface/m-p/2247504#M346185</link>
      <description>&lt;P&gt;&amp;nbsp; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cant ssh to inside interface access of ASA5505 firewall wihile ASDM and telnet are working. I have opened SSH access along with telnet and ASDM.&lt;/P&gt;&lt;P&gt;I can ssh to outside interface. Its very wied problem that SSH on inside interface is not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the oconfiguration of my ASA5505 firewall. Any solution please&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.3(2)4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname MEL-ASA-01&lt;/P&gt;&lt;P&gt;domain-name xxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.0.16.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address xxxxxxxxxx 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan50&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no forward interface Vlan1&lt;/P&gt;&lt;P&gt;nameif dmz&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 10.0.112.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;switchport access vlan 50&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;switchport access vlan 50&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa832-4-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;access-list Inside_noNAT extended permit ip any object-group Edn_LAN&lt;/P&gt;&lt;P&gt;access-list Inside_noNAT extended permit ip any object VPN_Dialup&lt;/P&gt;&lt;P&gt;access-list Inside_noNAT extended permit ip object-group Edn_LAN interface inside&lt;/P&gt;&lt;P&gt;access-list Inside_OUT extended permit tcp object-group email_allowed_hosts object edn-exc-01 eq smtp&lt;/P&gt;&lt;P&gt;access-list Inside_OUT extended deny tcp any any eq smtp&lt;/P&gt;&lt;P&gt;access-list Inside_OUT extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list Outside_IN extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list Edinburgh_tun_acl extended permit ip object MEL_Lan object-group Edn_LAN&lt;/P&gt;&lt;P&gt;access-list Edinburgh_tun_acl extended permit ip object MEL_Lan object VPN_Dialup&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging trap critical&lt;/P&gt;&lt;P&gt;logging history critical&lt;/P&gt;&lt;P&gt;logging asdm warnings&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-647.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,any) source static any any destination static Edn_LAN Edn_LAN&lt;/P&gt;&lt;P&gt;nat (inside,any) source static any any destination static VPN_Dialup VPN_Dialup&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;access-group Inside_OUT in interface inside&lt;/P&gt;&lt;P&gt;access-group Outside_IN in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xx.xx.xx.xx 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http Edn_Svr 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;http 10.0.16.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http xx.xx.xx.xx 255.255.255.224 outside&lt;/P&gt;&lt;P&gt;http Edn_Data 255.255.252.0 inside&lt;/P&gt;&lt;P&gt;snmp-server host inside 10.0.0.32 community ***** version 2c&lt;/P&gt;&lt;P&gt;snmp-server host inside 10.0.0.40 community ***** version 2c&lt;/P&gt;&lt;P&gt;snmp-server location Amsterdam&lt;/P&gt;&lt;P&gt;snmp-server contact &lt;/P&gt;&lt;P&gt;&lt;A href="mailto:ts@xxxxxxxxxxxxxx" target="_blank"&gt;ts@xxxxxxxxxxxxxx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;snmp-server enable traps syslog&lt;/P&gt;&lt;P&gt;snmp-server enable traps ipsec start stop&lt;/P&gt;&lt;P&gt;snmp-server enable traps entity config-change fru-insert fru-remove&lt;/P&gt;&lt;P&gt;snmp-server enable traps remote-access session-threshold-exceeded&lt;/P&gt;&lt;P&gt;telnet Edn_Data 255.255.252.0 inside&lt;BR /&gt;telnet 10.0.16.0 255.255.255.0 inside&lt;BR /&gt;telnet Edn_Svr 255.255.254.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh Edn_Svr 255.255.254.0 inside&lt;BR /&gt;ssh 10.0.16.0 255.255.255.0 inside&lt;BR /&gt;ssh Edn_Data 255.255.252.0 inside&lt;BR /&gt;ssh 172.16.1.16 255.255.255.255 inside&lt;BR /&gt;ssh edn-pix2 255.255.255.255 outside&lt;BR /&gt;ssh 94.175.211.224 255.255.255.224 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd option 150 ip 172.17.0.10&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.0.16.128-10.0.16.192 inside&lt;BR /&gt;dhcpd dns 10.0.16.11 10.0.0.11 interface inside&lt;BR /&gt;dhcpd wins 10.0.0.11 10.0.0.12 interface inside&lt;BR /&gt;dhcpd lease 86400 interface inside&lt;BR /&gt;dhcpd ping_timeout 750 interface inside&lt;BR /&gt;dhcpd domain axiossystems.com interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 10.0.0.1 source outside prefer&lt;BR /&gt;webvpn&lt;BR /&gt;username xxxxx password xxxxxxxxxx encrypted privilege 15&lt;BR /&gt;tunnel-group xxxxxxxxxxxxx type ipsec-l2l&lt;BR /&gt;tunnel-group xxxxxxxxx ipsec-attributes&lt;BR /&gt;pre-shared-key *****&lt;BR /&gt;peer-id-validate cert&lt;BR /&gt;tunnel-group xxx type ipsec-l2l&lt;BR /&gt;tunnel-group xxxxxxxxxxxxx ipsec-attributes&lt;BR /&gt;pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:6xxxxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:13:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-issue-on-inside-interface/m-p/2247504#M346185</guid>
      <dc:creator>mehmoodch</dc:creator>
      <dc:date>2019-03-12T02:13:57Z</dc:date>
    </item>
    <item>
      <title>SSH issue on inside interface.</title>
      <link>https://community.cisco.com/t5/network-security/ssh-issue-on-inside-interface/m-p/2247505#M346188</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Very strange that it would work from &lt;STRONG&gt;"outside"&lt;/STRONG&gt; and not &lt;STRONG&gt;"inside"&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the command &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show asp table socket&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To confirm if the ASA is listening on port TCP/22 on the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise I would probably suggest monitoring the SSH Connection attempt through the ASDM to determine what is the cause of the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume you are trying to connect from the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jul 2013 13:52:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-issue-on-inside-interface/m-p/2247505#M346188</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-18T13:52:25Z</dc:date>
    </item>
    <item>
      <title>SSH issue on inside interface.</title>
      <link>https://community.cisco.com/t5/network-security/ssh-issue-on-inside-interface/m-p/2247506#M346190</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni Fross&lt;/P&gt;&lt;P&gt;Yes I am trying to access on inside interface. Please find below the output of command. I am not sure how can I monitor via ASDM. can you please help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mahmood&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Protocol&amp;nbsp; Socket&amp;nbsp;&amp;nbsp;&amp;nbsp; Local Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Foreign Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; State&lt;/P&gt;&lt;P&gt;SSL&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0003de0f&amp;nbsp; 10.0.16.1:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0:*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LISTEN&lt;/P&gt;&lt;P&gt;SSL&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 000507cf&amp;nbsp; xxxxxxxxxx:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0:*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LISTEN&lt;/P&gt;&lt;P&gt;TCP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 000934ff&amp;nbsp; 10.0.16.1:22&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0:*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LISTEN&lt;/P&gt;&lt;P&gt;TCP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 000c9daf&amp;nbsp; xxxxxxxxxx.22:22&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0:*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LISTEN&lt;/P&gt;&lt;P&gt;TCP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 01d755bf&amp;nbsp; 10.0.16.1:23&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0:*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LISTEN&lt;/P&gt;&lt;P&gt;SSL&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 02e95178&amp;nbsp; 10.0.16.1:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.1.16:50078&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ESTAB&lt;/P&gt;&lt;P&gt;SSL&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 02ed4e28&amp;nbsp; 10.0.16.1:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.1.16:50080&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ESTAB&lt;/P&gt;&lt;P&gt;TCP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 031061d8&amp;nbsp; 10.0.16.1:23&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.1.16:51609&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ESTAB&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jul 2013 14:02:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-issue-on-inside-interface/m-p/2247506#M346190</guid>
      <dc:creator>mehmoodch</dc:creator>
      <dc:date>2013-07-18T14:02:57Z</dc:date>
    </item>
    <item>
      <title>SSH issue on inside interface.</title>
      <link>https://community.cisco.com/t5/network-security/ssh-issue-on-inside-interface/m-p/2247507#M346192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well first of I would look at the monitor logging section while attempting the SSH connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that doesnt help then you always have the option to use &lt;STRONG&gt;"debug ssh"&lt;/STRONG&gt; and monitor the output through ASDM or a Telnet management connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above output would seem to indicate that the ASA is listening on the port TCP/22 on the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you just getting timeout for the SSH connection or are you getting any prompts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jul 2013 14:17:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-issue-on-inside-interface/m-p/2247507#M346192</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-18T14:17:11Z</dc:date>
    </item>
    <item>
      <title>SSH issue on inside interface.</title>
      <link>https://community.cisco.com/t5/network-security/ssh-issue-on-inside-interface/m-p/2247508#M346194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have run SSH DEBUG command but I am not getting any output on prompt.&lt;/P&gt;&lt;P&gt;I am not getting any log on ASDM as well. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am getting the following error when trying ssh to inside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The session used to hang up for 2-3 minutes and then returned the following error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Putty fatal Error&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Network Error: Software caused connection abort&amp;nbsp; "&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jul 2013 14:36:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-issue-on-inside-interface/m-p/2247508#M346194</guid>
      <dc:creator>mehmoodch</dc:creator>
      <dc:date>2013-07-18T14:36:35Z</dc:date>
    </item>
    <item>
      <title>SSH issue on inside interface.</title>
      <link>https://community.cisco.com/t5/network-security/ssh-issue-on-inside-interface/m-p/2247509#M346197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand that you are able to connect via outside, but try by regenerating the crypto key. Just a thought &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="16" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif" width="16"&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jul 2013 16:26:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-issue-on-inside-interface/m-p/2247509#M346197</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2013-07-18T16:26:48Z</dc:date>
    </item>
  </channel>
</rss>

