<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: telnet to PIX outside interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/telnet-to-pix-outside-interface/m-p/410176#M558707</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To telnet to the outside intf of your pix from a outside source IP address you'll need SSH access enabled, to do this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Generate RSA keys first:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; in config mode: ca generate rsa key &lt;KEY_MODULE_SIZE&gt; -- use 1024&lt;/KEY_MODULE_SIZE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Save the generated keys with:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; ca save all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can check your new keys by issuing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; sho ca mypubkey rsa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, configure SSH access on the pix by issuing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; ssh &lt;PUBLIC_SOURCE_IP&gt; 255.255.255.255 outside&lt;/PUBLIC_SOURCE_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* that "public_source_ip" is the ip from were you are connecting from with SSH.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can download a free SSH client, I use Putty - which can be obtained freely just type putty.exe on google.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now for you other question on running PDM via the IPSec tunnel, read the following URL:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/netmgtsw/ps2032/products_configuration_example09186a0080094497.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/netmgtsw/ps2032/products_configuration_example09186a0080094497.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps and please rate post if does help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jay.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 04 May 2005 06:39:12 GMT</pubDate>
    <dc:creator>jmia</dc:creator>
    <dc:date>2005-05-04T06:39:12Z</dc:date>
    <item>
      <title>telnet to PIX outside interface</title>
      <link>https://community.cisco.com/t5/network-security/telnet-to-pix-outside-interface/m-p/410171#M558694</link>
      <description>&lt;P&gt;hi..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;first i would like thanks Cisco to give me this great Opportunity to ask the professional..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my problem is that i cant telnet or run the PDM from outside the network, although through an IPSEC tunnel as Cisco Advise.. !! I can telnet and run the PDM from the host i assigned inside the network . &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so, i need your help now ..&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:07:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/telnet-to-pix-outside-interface/m-p/410171#M558694</guid>
      <dc:creator>haithamsaif</dc:creator>
      <dc:date>2020-02-21T08:07:23Z</dc:date>
    </item>
    <item>
      <title>Re: telnet to PIX outside interface</title>
      <link>https://community.cisco.com/t5/network-security/telnet-to-pix-outside-interface/m-p/410172#M558696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Try configuring this command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;B&gt;management-access &lt;I&gt;mgmt_if&lt;/I&gt;&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this allows pdm and telnet access to the pix's inside interface while connecting over an ipsec vpn tunnel&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_command_reference_chapter09186a00801727ab.html#wp1137951" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_command_reference_chapter09186a00801727ab.html#wp1137951&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let us know if that helped&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mustafa&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 May 2005 16:23:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/telnet-to-pix-outside-interface/m-p/410172#M558696</guid>
      <dc:creator>mhussein</dc:creator>
      <dc:date>2005-05-03T16:23:33Z</dc:date>
    </item>
    <item>
      <title>Re: telnet to PIX outside interface</title>
      <link>https://community.cisco.com/t5/network-security/telnet-to-pix-outside-interface/m-p/410173#M558700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi... &lt;/P&gt;&lt;P&gt;i did configure it.. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;management-access outside .. but it sounds useless in my case.. i dont think that i forget a command in the configuration.. am really confused about it&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 May 2005 19:30:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/telnet-to-pix-outside-interface/m-p/410173#M558700</guid>
      <dc:creator>haithamsaif</dc:creator>
      <dc:date>2005-05-03T19:30:49Z</dc:date>
    </item>
    <item>
      <title>Re: telnet to PIX outside interface</title>
      <link>https://community.cisco.com/t5/network-security/telnet-to-pix-outside-interface/m-p/410174#M558702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Assuming your IKE and IPSEC SA's are up and operational: Tell me your IPSEC endpoint setup i.e router to router, pix to pix, vpn client to router, vpn client to pix.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; It seems to me that your crypto acls are incorrect. I had this same problem and it was the crypto acls (reverse if running easy vpn server)  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Define your ipsec endpoints for me and post your crypto acls. Also, let me know your public and private addresses on your pix and public addresses on the perimeter router(substitute with fake addresses so you don't divulge actual routable addresses)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 May 2005 19:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/telnet-to-pix-outside-interface/m-p/410174#M558702</guid>
      <dc:creator>Ngcuser123</dc:creator>
      <dc:date>2005-05-03T19:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: telnet to PIX outside interface</title>
      <link>https://community.cisco.com/t5/network-security/telnet-to-pix-outside-interface/m-p/410175#M558705</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi sir, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the IPSEC Tunnel is between vpnclient and the PIX am trying to telnet to its outside interface.. here ill paste the configuration i did to achieve that.. but it didnt work.. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 172.16.0.0 255.255.0.0 172.16.180.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Managment_interested_traffic permit ip A.B.C.D 255.255.255.240 any&lt;/P&gt;&lt;P&gt;access-list Managment_interested_traffic permit ip 172.16.8.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address outside A.B.C.D+1 255.255.255.240&lt;/P&gt;&lt;P&gt;ip address inside 172.16.8.2 255.255.255.0&lt;/P&gt;&lt;P&gt;ip local pool managment_pool 172.16.180.1 mask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pdm location 172.16.180.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.16.180.1 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set Managment_set esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map cisco 1 set transform-set Managment_set&lt;/P&gt;&lt;P&gt;crypto map dyn-map 10 ipsec-isakmp dynamic cisco&lt;/P&gt;&lt;P&gt;crypto map dyn-map interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 0.0.0.0 netmask 0.0.0.0&lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 20 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup Managment address-pool managment_pool&lt;/P&gt;&lt;P&gt;vpngroup Managment dns-server *.*.*.*&lt;/P&gt;&lt;P&gt;vpngroup Managment default-domain ********.**&lt;/P&gt;&lt;P&gt;vpngroup Managment split-tunnel Managment_interested_traffic&lt;/P&gt;&lt;P&gt;vpngroup Managment idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup Managment password ********&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;telnet 172.16.180.1 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;management-access outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the IPSEC Tunnel is up.. ! and i can ping the interfaces.. ! did i miss something.. ?!&lt;/P&gt;&lt;P&gt;thnx&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 May 2005 05:38:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/telnet-to-pix-outside-interface/m-p/410175#M558705</guid>
      <dc:creator>haithamsaif</dc:creator>
      <dc:date>2005-05-04T05:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: telnet to PIX outside interface</title>
      <link>https://community.cisco.com/t5/network-security/telnet-to-pix-outside-interface/m-p/410176#M558707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To telnet to the outside intf of your pix from a outside source IP address you'll need SSH access enabled, to do this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Generate RSA keys first:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; in config mode: ca generate rsa key &lt;KEY_MODULE_SIZE&gt; -- use 1024&lt;/KEY_MODULE_SIZE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Save the generated keys with:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; ca save all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can check your new keys by issuing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; sho ca mypubkey rsa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, configure SSH access on the pix by issuing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; ssh &lt;PUBLIC_SOURCE_IP&gt; 255.255.255.255 outside&lt;/PUBLIC_SOURCE_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* that "public_source_ip" is the ip from were you are connecting from with SSH.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can download a free SSH client, I use Putty - which can be obtained freely just type putty.exe on google.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now for you other question on running PDM via the IPSec tunnel, read the following URL:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/netmgtsw/ps2032/products_configuration_example09186a0080094497.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/netmgtsw/ps2032/products_configuration_example09186a0080094497.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps and please rate post if does help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jay.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 May 2005 06:39:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/telnet-to-pix-outside-interface/m-p/410176#M558707</guid>
      <dc:creator>jmia</dc:creator>
      <dc:date>2005-05-04T06:39:12Z</dc:date>
    </item>
    <item>
      <title>Re: telnet to PIX outside interface</title>
      <link>https://community.cisco.com/t5/network-security/telnet-to-pix-outside-interface/m-p/410177#M558708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; As I originally thought, it is indeed your crytpo/nonat acl's. I configured an easyvpn from a vpn client to a pix in my lab. I could initiate a vpn tunnel from the vpn client to the pix and telnet to the outside interface. Your crypto/nonat acl has to state the outside address (host A.B.C.D) to your pool that get's pushed down between IKE Ph1 and Ph2 (config mode). You incorrectly listed the outside pix address in your crypto/nonat acl as a network address (A.B.C.D 255.255.255.240) instead of a host address). Your nonat acl has to reflect the methodology I listed above. Attached is my exact pix configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, you DO NOT need to configure ssh, I did not use any additional software such as putty to establish the telnet connection. Let me know how you make out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 May 2005 20:20:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/telnet-to-pix-outside-interface/m-p/410177#M558708</guid>
      <dc:creator>Ngcuser123</dc:creator>
      <dc:date>2005-05-04T20:20:11Z</dc:date>
    </item>
    <item>
      <title>Re: telnet to PIX outside interface</title>
      <link>https://community.cisco.com/t5/network-security/telnet-to-pix-outside-interface/m-p/410178#M558711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Use ssh from outside the pix&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh should be enabled by default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh ip_address [netmask] [interface_name]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh 171.68.225.212 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;default pix usename is pix and password is cisco&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Aman&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 May 2005 16:10:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/telnet-to-pix-outside-interface/m-p/410178#M558711</guid>
      <dc:creator>adiwakar</dc:creator>
      <dc:date>2005-05-05T16:10:51Z</dc:date>
    </item>
  </channel>
</rss>

