<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSH on Outside interface on ASA 5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-on-outside-interface-on-asa-5510/m-p/2037970#M398061</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ah OK, make sense.&lt;/P&gt;&lt;P&gt;I assume that since you are accesing Site B public IP address (outside), then the SSH traffic does not go through the VPN tunnel. If that is the case, then you would need to check what is the NATed public ip address of site A and add that public IP on to Site B SSH command.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 06 Oct 2012 08:26:08 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-10-06T08:26:08Z</dc:date>
    <item>
      <title>SSH on Outside interface on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ssh-on-outside-interface-on-asa-5510/m-p/2037967#M398057</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: trebuchet ms,geneva;"&gt;Hi All, &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: trebuchet ms,geneva;"&gt;I need the ssh access on my ASA outside interface and have added &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: trebuchet ms,geneva;"&gt;ssh ipremoved 255.255.255.255 outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: trebuchet ms,geneva;"&gt; access-list acl_outside extended permit tcp host ipremoved any eq 22&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: trebuchet ms,geneva;"&gt;but this is the log i get from ASA &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: trebuchet ms,geneva;"&gt;Oct 06 2012 16:10:04: %ASA-3-710003: TCP access denied by ACL from ipremoved/39884 to outside:ipremoved/22&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.2(5)&lt;/P&gt;&lt;P&gt;Device Manager Version 6.4(5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: trebuchet ms,geneva;"&gt;can someone please help me&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: trebuchet ms,geneva;"&gt;many thanks &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: trebuchet ms,geneva;"&gt;cheers.. &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:05:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-on-outside-interface-on-asa-5510/m-p/2037967#M398057</guid>
      <dc:creator>catalystexpress</dc:creator>
      <dc:date>2019-03-12T00:05:18Z</dc:date>
    </item>
    <item>
      <title>SSH on Outside interface on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ssh-on-outside-interface-on-asa-5510/m-p/2037968#M398058</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't need to configure access-list on the outside interface to allow ssh if you are trying to ssh to the ASA itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All you need is to make sure that the time on the ASA is correct, generate key-pair, and configure the ssh to allow the access from the ip address where you are connecting from (as you've configured above).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, make sure that you don't have any static PAT for TCP/22 using the ASA outside interface IP Address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2012 08:16:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-on-outside-interface-on-asa-5510/m-p/2037968#M398058</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-06T08:16:12Z</dc:date>
    </item>
    <item>
      <title>SSH on Outside interface on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ssh-on-outside-interface-on-asa-5510/m-p/2037969#M398059</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;many thanks for the quick reply &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my connection is something like below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Site A&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Site B&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC--10.6.40.148 ---- ASA public IP -------------cloud --------------------public IP ASA&lt;/P&gt;&lt;P&gt;Site to Site IPsec VPN &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am able to ssh to the ASA on the private ip management interface, now i need to ssh to the site B public IP to manage &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have allowed the acl on site A ASA for the PC to go i can see the hit count on it &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The&amp;nbsp; reason being i need to manage the Site B ASA on public because on Site A am changing the internet provider and so if i have the acces to site B&amp;nbsp; ASA i can change the peer IP to new IP and reestablish the VPN &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;many thanks for the help &lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2012 08:21:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-on-outside-interface-on-asa-5510/m-p/2037969#M398059</guid>
      <dc:creator>catalystexpress</dc:creator>
      <dc:date>2012-10-06T08:21:50Z</dc:date>
    </item>
    <item>
      <title>SSH on Outside interface on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ssh-on-outside-interface-on-asa-5510/m-p/2037970#M398061</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ah OK, make sense.&lt;/P&gt;&lt;P&gt;I assume that since you are accesing Site B public IP address (outside), then the SSH traffic does not go through the VPN tunnel. If that is the case, then you would need to check what is the NATed public ip address of site A and add that public IP on to Site B SSH command.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2012 08:26:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-on-outside-interface-on-asa-5510/m-p/2037970#M398061</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-06T08:26:08Z</dc:date>
    </item>
    <item>
      <title>SSH on Outside interface on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ssh-on-outside-interface-on-asa-5510/m-p/2037971#M398063</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have already done that on Site B&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh ipremoved 255.255.255.255 outside&lt;/P&gt;&lt;P&gt; access-list acl_outside extended permit tcp host ipremoved any eq 22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but still does not go through, the log from Site B&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oct 06 2012 16:10:04: %ASA-3-710003: TCP access denied by ACL from ipremoved/39884 to outside:ipremoved/22&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2012 08:38:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-on-outside-interface-on-asa-5510/m-p/2037971#M398063</guid>
      <dc:creator>catalystexpress</dc:creator>
      <dc:date>2012-10-06T08:38:19Z</dc:date>
    </item>
    <item>
      <title>SSH on Outside interface on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ssh-on-outside-interface-on-asa-5510/m-p/2037972#M398064</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do you have any static PAT on port 22 configured on site B using site B outside interface ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2012 08:44:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-on-outside-interface-on-asa-5510/m-p/2037972#M398064</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-06T08:44:18Z</dc:date>
    </item>
    <item>
      <title>SSH on Outside interface on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ssh-on-outside-interface-on-asa-5510/m-p/2037973#M398065</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sorry it was a mistake from my end, i had the wrong IP configured in the Site B ssh commad instead of x.x.x.243 i had x.x.x.43 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;many thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Oct 2012 06:14:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-on-outside-interface-on-asa-5510/m-p/2037973#M398065</guid>
      <dc:creator>catalystexpress</dc:creator>
      <dc:date>2012-10-07T06:14:58Z</dc:date>
    </item>
    <item>
      <title>SSH on Outside interface on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ssh-on-outside-interface-on-asa-5510/m-p/2037974#M398066</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem, great to hear it's all good now.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Oct 2012 19:55:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-on-outside-interface-on-asa-5510/m-p/2037974#M398066</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-07T19:55:55Z</dc:date>
    </item>
  </channel>
</rss>

