<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA SSH / Telnet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191269#M359864</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command really shouldnt have any effect on any connections. Its a basic configuration needed on an ASA to enable SSH management connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your route seems to be pointing to an address 10.0.1.10 which IS NOT part of the network 10.0.10.0/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So seems to be a typo there. Probably should be 10.0.10.10?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 19 Mar 2013 16:46:57 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-03-19T16:46:57Z</dc:date>
    <item>
      <title>ASA SSH / Telnet</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191266#M359857</link>
      <description>&lt;P&gt;I just configured my ASA so I can remote access via SSH but I can't seem to get it to work. I have my ASA (10.0.10.1) with my wireleess router (192.168.0.1) connected via the WAN port.&amp;nbsp; I should be able to access the ASA from my laptop (192.168.0.105) correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my current config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.0(3)6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname Firewall&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.0.10.1 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 24.234.XXX.XXX 255.255.XXX.XXX&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 8.8.8.8&lt;/P&gt;&lt;P&gt; name-server 8.8.4.4&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm warnings&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp deny any outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-603.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 24.234.118.193 1&lt;/P&gt;&lt;P&gt;route inside 192.168.0.0 255.255.255.0 10.0.1.10 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 15&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 10.0.10.2-10.0.10.12 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;ntp server 64.147.116.229 source outside prefer&lt;/P&gt;&lt;P&gt;username woodjl1650 password slFkVmxAtfauhVaf encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:2f1bd939ffb4683ec5c0b4265bd32951&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:16:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191266#M359857</guid>
      <dc:creator>jwood1650</dc:creator>
      <dc:date>2019-03-12T01:16:25Z</dc:date>
    </item>
    <item>
      <title>ASA SSH / Telnet</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191267#M359859</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In addition to the current SSH configurations you will need to issue the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto key generate rsa modulus 2048&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to be able to use SSH into the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure if you had problem with Telnet also? For that you dont atleast have the configuration allowing Telnet connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;telnet 192.168.0.0 255.255.255.0 inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Mar 2013 16:03:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191267#M359859</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-19T16:03:23Z</dc:date>
    </item>
    <item>
      <title>ASA SSH / Telnet</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191268#M359862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;added that but now I can't ping from my ASA to my laptop....but I can ping my ASA from my laptop.... are my routes correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall# show route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gateway of last resort is 24.234.118.193 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 127.0.0.0 255.255.255.0 is directly connected, _internal_loopback&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.234.118.192 255.255.255.224 is directly connected, outside&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.10.0 255.255.255.240 is directly connected, inside&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.0 255.255.255.0 [1/0] via 10.0.1.10, inside&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;----192.168.0.1 is my wireless router connected to e0/1&lt;/P&gt;&lt;P&gt;S*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 24.234.118.193, outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Mar 2013 16:39:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191268#M359862</guid>
      <dc:creator>jwood1650</dc:creator>
      <dc:date>2013-03-19T16:39:29Z</dc:date>
    </item>
    <item>
      <title>ASA SSH / Telnet</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191269#M359864</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command really shouldnt have any effect on any connections. Its a basic configuration needed on an ASA to enable SSH management connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your route seems to be pointing to an address 10.0.1.10 which IS NOT part of the network 10.0.10.0/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So seems to be a typo there. Probably should be 10.0.10.10?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Mar 2013 16:46:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191269#M359864</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-19T16:46:57Z</dc:date>
    </item>
    <item>
      <title>ASA SSH / Telnet</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191270#M359869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yep type, corrected and still can't ping from my ASA to my laptop:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall# show route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gateway of last resort is 24.234.118.193 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 127.0.0.0 255.255.255.0 is directly connected, _internal_loopback&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.234.118.192 255.255.255.224 is directly connected, outside&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.10.0 255.255.255.240 is directly connected, inside&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.0 255.255.255.0 [1/0] via 10.0.10.0, inside&lt;/P&gt;&lt;P&gt;S*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 24.234.118.193, outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall# ping 192.168.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;----------------Wireless Router&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 192.168.0.1, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;?????&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.0.10.1 255.255.255.240&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;--------ASA IP Address&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Mar 2013 16:55:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191270#M359869</guid>
      <dc:creator>jwood1650</dc:creator>
      <dc:date>2013-03-19T16:55:41Z</dc:date>
    </item>
    <item>
      <title>ASA SSH / Telnet</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191271#M359873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We dont know how the router is configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We for example dont know if its doing some basic Dynamic PAT translation for the network 192.168.0.0/24 when traffic crosses from that network to the interface which is connected to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It might be that you can PING from the hosts on the network 192.168.0.0/24 to the ASA interface IP address 10.0.10.1&amp;nbsp; BUT COULDNT PING the network 192.168.0.0/24 from the ASA. A NAT being on the Router might explain this behaviour.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the router isnt doing any sort of NAT and is just simply routing then it should work with the ASA configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So for you to be able to ping the network behind the router, the router can not do any type of NAT for its network 192.168.0.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Mar 2013 17:01:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191271#M359873</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-19T17:01:13Z</dc:date>
    </item>
    <item>
      <title>Re:ASA SSH / Telnet</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191272#M359875</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry..my current config is at the top post...I am away from my ASA right now and can't repost it. But the NAT starement is: NAT (inside) 0.0.0.0 0.0.0.0 1&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Mar 2013 17:24:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191272#M359875</guid>
      <dc:creator>jwood1650</dc:creator>
      <dc:date>2013-03-19T17:24:46Z</dc:date>
    </item>
    <item>
      <title>ASA SSH / Telnet</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191273#M359877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you missunderstood me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me it seems you have the following setup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;PUBLIC network=""&gt; - &lt;ASA&gt; - 10.0.10.0/24 - &lt;ROUTER&gt; - 192.168.0.0/24&lt;/ROUTER&gt;&lt;/ASA&gt;&lt;/PUBLIC&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And you are telling on the ASA that the network 192.168.0.0/24 is located behind the IP address 10.0.10.1 which to my understanding would be the interface IP address of the Router towards the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now what I mean with the NAT is that I think your router is possibly doing a Dynamic NAT or Dynamic PAT between network 192.168.0.0/24 and 10.0.10.0/24 and therefore the router would block the PING.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What makes me think the router is doing NAT is because the PING doesnt work AND the fact that almost every basic router will by default do NAT between its LAN and WAN interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But again, I dont know how the router is configured but I dont see any problem on the ASA preventing from PINGing the network behind the router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can add "icmp permit any inside" if you want but not sure if it will help in this case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Mar 2013 17:34:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191273#M359877</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-19T17:34:12Z</dc:date>
    </item>
    <item>
      <title>Re:ASA SSH / Telnet</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191274#M359879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok...I misunderstood what you were saying....I'll check my router and see if I can fix it&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Mar 2013 17:47:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-telnet/m-p/2191274#M359879</guid>
      <dc:creator>jwood1650</dc:creator>
      <dc:date>2013-03-19T17:47:58Z</dc:date>
    </item>
  </channel>
</rss>

