<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA ssh acess after nusses scan in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-ssh-acess-after-nusses-scan/m-p/1701628#M557278</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No 8.4.1.x interims have been publically made available yet. If you open a TAC case, however, the engineer can post the latest build for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Brendan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 22 Apr 2011 18:08:23 GMT</pubDate>
    <dc:creator>brquinn</dc:creator>
    <dc:date>2011-04-22T18:08:23Z</dc:date>
    <item>
      <title>ASA ssh acess after nusses scan</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-acess-after-nusses-scan/m-p/1701624#M557269</link>
      <description>&lt;P&gt;I have an 5510 running 8.4(1) I can ssh into the system with no problems until I scan the device with Nessus security scanner. After that I just get timeouts from the client when I try to connect and the only way to fix the problem is to reload the device. I have included 2 syslog dumps one showing ssh into the device before(working) the scan and one after(not working).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not have any acls on that int and I have turned off basic threat detection. The devices is still running I can login via the serial console and via ASDM it just appears ssh is someone shutdown or hung.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WORKING&lt;/P&gt;&lt;P&gt;4/21/2011 11:33:43 AM&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.11.108&amp;nbsp;&amp;nbsp;&amp;nbsp; Debug&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-7-609002: Teardown local-host testing:192.168.65.106 duration 0:00:10&lt;BR /&gt;4/21/2011 11:33:43 AM&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.11.108&amp;nbsp;&amp;nbsp;&amp;nbsp; Informational&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-6-302014: Teardown TCP connection 50 for testing:192.168.65.106/4462 to identity:192.168.11.108/22 duration 0:00:10 bytes 3691 TCP Reset-O&lt;BR /&gt;4/21/2011 11:33:43 AM&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.11.108&amp;nbsp;&amp;nbsp;&amp;nbsp; Informational&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-6-315011: SSH session from 192.168.65.106 on interface testing for user "test" terminated normally&lt;BR /&gt;4/21/2011 11:33:40 AM&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.11.108&amp;nbsp;&amp;nbsp;&amp;nbsp; Informational&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-6-605005: Login permitted from 192.168.65.106/4462 to testing:192.168.11.108/ssh for user "leeh"&lt;BR /&gt;4/21/2011 11:33:40 AM&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.11.108&amp;nbsp;&amp;nbsp;&amp;nbsp; Informational&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-6-611101: User authentication succeeded: Uname: test&lt;BR /&gt;4/21/2011 11:33:40 AM&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.11.108&amp;nbsp;&amp;nbsp;&amp;nbsp; Informational&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-6-611101: User authentication succeeded: Uname: test&lt;BR /&gt;4/21/2011 11:33:40 AM&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.11.108&amp;nbsp;&amp;nbsp;&amp;nbsp; Informational&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-6-113008: AAA transaction status ACCEPT : user = test&lt;BR /&gt;4/21/2011 11:33:40 AM&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.11.108&amp;nbsp;&amp;nbsp;&amp;nbsp; Informational&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-6-113012: AAA user authentication Successful : local database : user = test&lt;BR /&gt;4/21/2011 11:33:33 AM&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.11.108&amp;nbsp;&amp;nbsp;&amp;nbsp; Informational&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-6-302013: Built inbound TCP connection 50 for testing:192.168.65.106/4462 (192.168.65.106/4462) to identity:192.168.11.108/22 (192.168.11.108/22)&lt;BR /&gt;4/21/2011 11:33:33 AM&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.11.108&amp;nbsp;&amp;nbsp;&amp;nbsp; Debug&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-7-609001: Built local-host testing:192.168.65.106&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;___________________&lt;/P&gt;&lt;P&gt;NOT WORKING&lt;/P&gt;&lt;P&gt;4/21/2011 12:38:17 PM&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.11.108&amp;nbsp;&amp;nbsp;&amp;nbsp; Informational&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-6-302014: Teardown TCP connection 86 for testing:192.168.65.106/1954 to identity:192.168.11.108/22 duration 0:05:01 bytes 0 Connection timeout&lt;BR /&gt;4/21/2011 12:38:17 PM&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.11.108&amp;nbsp;&amp;nbsp;&amp;nbsp; Debug&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-7-609002: Teardown local-host testing:192.168.65.106 duration 0:05:01&lt;BR /&gt;4/21/2011 12:33:15 PM&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.11.108&amp;nbsp;&amp;nbsp;&amp;nbsp; Debug&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-7-609001: Built local-host testing:192.168.65.106&lt;BR /&gt;4/21/2011 12:33:15 PM&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.11.108&amp;nbsp;&amp;nbsp;&amp;nbsp; Informational&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-6-302013: Built inbound TCP connection 86 for testing:192.168.65.106/1954 (192.168.65.106/1954) to identity:192.168.11.108/22 (192.168.11.108/22)&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:24:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-acess-after-nusses-scan/m-p/1701624#M557269</guid>
      <dc:creator>lostngone</dc:creator>
      <dc:date>2019-03-11T20:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ssh acess after nusses scan</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-acess-after-nusses-scan/m-p/1701625#M557272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you see the output of "show asp table socket" before and after a nessus scan, to check if ASA is listening on port 22 for the interface you are trying to ssh. Also if it doesn't work after a nessus scan, try removing the ssh related config and put it back, and then check again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The logs you've put don't help much, since the log shows that it built a connection in the non-working section as well.(last log).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Shrikant&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Apr 2011 21:26:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-acess-after-nusses-scan/m-p/1701625#M557272</guid>
      <dc:creator>Shrikant Sundaresh</dc:creator>
      <dc:date>2011-04-21T21:26:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ssh acess after nusses scan</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-acess-after-nusses-scan/m-p/1701626#M557274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Heym&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might also want to check out the following bug:&lt;A class="active_link" href="http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCtl77907"&gt;CSCtl77907&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It basically states that in version 8.4.1, if there is a failure to open SSH (probably what happens during the nessus scan), then further connections will also be dropped. The bug is fixed in version 8.4.1.2. You can try upgrading to that and update here, whether it works properly now or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Shrikant&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S.: Please mark this question as answered if it has been resolved. Do rate helpful posts. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Apr 2011 21:38:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-acess-after-nusses-scan/m-p/1701626#M557274</guid>
      <dc:creator>Shrikant Sundaresh</dc:creator>
      <dc:date>2011-04-21T21:38:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ssh acess after nusses scan</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-acess-after-nusses-scan/m-p/1701627#M557276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I finally had a chance to get back to this problem. Thank you for your quick response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It does indeed look like bug CSCtl77907 I get the exact error reported in the symptom field when I try re-adding the ssh configuration in the device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am guessing 8.4(1.2) isn't available yet? I only see 8.4(1) when I log in and go to downloads.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you again, I would have been pulling my hair out trying to figure this one out without your help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Apr 2011 17:33:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-acess-after-nusses-scan/m-p/1701627#M557276</guid>
      <dc:creator>lostngone</dc:creator>
      <dc:date>2011-04-22T17:33:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ssh acess after nusses scan</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-acess-after-nusses-scan/m-p/1701628#M557278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No 8.4.1.x interims have been publically made available yet. If you open a TAC case, however, the engineer can post the latest build for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Brendan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Apr 2011 18:08:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-acess-after-nusses-scan/m-p/1701628#M557278</guid>
      <dc:creator>brquinn</dc:creator>
      <dc:date>2011-04-22T18:08:23Z</dc:date>
    </item>
  </channel>
</rss>

