<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH Issue with ASA 5505 running 8.3(2) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-issue-with-asa-5505-running-8-3-2/m-p/1738732#M534325</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it was worth a shot &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if there is anyway you can view the ASA log to see what messages lurk there, I'd try that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;having a console connection while the ssh attempt is made to view the log and/or debug can be helpful&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 04 Aug 2011 22:31:10 GMT</pubDate>
    <dc:creator>lcaruso</dc:creator>
    <dc:date>2011-08-04T22:31:10Z</dc:date>
    <item>
      <title>SSH Issue with ASA 5505 running 8.3(2)</title>
      <link>https://community.cisco.com/t5/network-security/ssh-issue-with-asa-5505-running-8-3-2/m-p/1738727#M534294</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm replacing a new ASA 5505 due to a corrupted flash.&amp;nbsp; On the original unit, I had the ability to SSH into the device using TeraTerm with no problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While configuring the new device, I entered the following commands to enable SSH into the unit:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto key generate rsa modulus 1024&lt;/P&gt;&lt;P&gt;write mem&lt;/P&gt;&lt;P&gt;ssh 192.168.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, now, using TeraTerm, anytime I attempt to SSH into the unit, I get the following message:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the encryption algorithms that this program and the server both understand have been disabled.&amp;nbsp; To communicate with this server, you will have to enable some more ciphers in the TTSSH Setup dialog box when you run Tera Term again.&amp;nbsp; This connection will now close.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Aubrey&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:07:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-issue-with-asa-5505-running-8-3-2/m-p/1738727#M534294</guid>
      <dc:creator>aubreyrhame</dc:creator>
      <dc:date>2019-03-11T21:07:18Z</dc:date>
    </item>
    <item>
      <title>SSH Issue with ASA 5505 running 8.3(2)</title>
      <link>https://community.cisco.com/t5/network-security/ssh-issue-with-asa-5505-running-8-3-2/m-p/1738728#M534299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Have you tried clearing the ssh key and recreating the same?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 20:47:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-issue-with-asa-5505-running-8-3-2/m-p/1738728#M534299</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2011-08-04T20:47:20Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Issue with ASA 5505 running 8.3(2)</title>
      <link>https://community.cisco.com/t5/network-security/ssh-issue-with-asa-5505-running-8-3-2/m-p/1738729#M534305</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I have&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 20:52:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-issue-with-asa-5505-running-8-3-2/m-p/1738729#M534305</guid>
      <dc:creator>aubreyrhame</dc:creator>
      <dc:date>2011-08-04T20:52:21Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Issue with ASA 5505 running 8.3(2)</title>
      <link>https://community.cisco.com/t5/network-security/ssh-issue-with-asa-5505-running-8-3-2/m-p/1738730#M534310</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;re: ssh 192.168.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;did you intend to use subnet zero?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if not, try 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;maybe that will make a difference&lt;/P&gt;&lt;P&gt;then make sure whatever you use on the ASA is exactly the same on the SSH client&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 21:16:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-issue-with-asa-5505-running-8-3-2/m-p/1738730#M534310</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-08-04T21:16:00Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Issue with ASA 5505 running 8.3(2)</title>
      <link>https://community.cisco.com/t5/network-security/ssh-issue-with-asa-5505-running-8-3-2/m-p/1738731#M534316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, this way anyone on the 192.168.0.1-192.168.0.254 subnet could ssh into the ASA device&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 21:54:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-issue-with-asa-5505-running-8-3-2/m-p/1738731#M534316</guid>
      <dc:creator>aubreyrhame</dc:creator>
      <dc:date>2011-08-04T21:54:22Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Issue with ASA 5505 running 8.3(2)</title>
      <link>https://community.cisco.com/t5/network-security/ssh-issue-with-asa-5505-running-8-3-2/m-p/1738732#M534325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it was worth a shot &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if there is anyway you can view the ASA log to see what messages lurk there, I'd try that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;having a console connection while the ssh attempt is made to view the log and/or debug can be helpful&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 22:31:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-issue-with-asa-5505-running-8-3-2/m-p/1738732#M534325</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-08-04T22:31:10Z</dc:date>
    </item>
  </channel>
</rss>

