<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Pix failover SSH key in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-failover-ssh-key/m-p/158165#M708462</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a workaround with regards to being unable to SSH to the secondary pix firewall once having failed over?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 06:25:06 GMT</pubDate>
    <dc:creator>dawsonpa</dc:creator>
    <dc:date>2020-02-21T06:25:06Z</dc:date>
    <item>
      <title>Pix failover SSH key</title>
      <link>https://community.cisco.com/t5/network-security/pix-failover-ssh-key/m-p/158165#M708462</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a workaround with regards to being unable to SSH to the secondary pix firewall once having failed over?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:25:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-failover-ssh-key/m-p/158165#M708462</guid>
      <dc:creator>dawsonpa</dc:creator>
      <dc:date>2020-02-21T06:25:06Z</dc:date>
    </item>
    <item>
      <title>Re: Pix failover SSH key</title>
      <link>https://community.cisco.com/t5/network-security/pix-failover-ssh-key/m-p/158166#M708474</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Actually, I've wondered about this myself. On the PIX side of things, I don't think theres much that you can do. I'm not aware of a way to copy over the generated RSA keys from the Primary to the Secondary, or vice versa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; It all depends on your SSH client, I suppose. If you SSH to the PIX via a UN*X environment, you could remove the cached server key saved in your known_hosts file. Normally this is located under ~/.ssh/known_hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; If you use a Windows SSH client (or some other OS), you'll have to consult your clients documentation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Normally there's an option you can give when starting up the SSH client to not strictly enforce host key checking, but by doing so it opens up a whole new can of worms..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Regards,&lt;/P&gt;&lt;P&gt;-Joshua&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Dec 2002 19:47:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-failover-ssh-key/m-p/158166#M708474</guid>
      <dc:creator>dro</dc:creator>
      <dc:date>2002-12-06T19:47:35Z</dc:date>
    </item>
    <item>
      <title>Re: Pix failover SSH key</title>
      <link>https://community.cisco.com/t5/network-security/pix-failover-ssh-key/m-p/158167#M708494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"If you use a Windows SSH client ... " never!!! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I can remove the ~/.ssh/known_hosts.&lt;/P&gt;&lt;P&gt;So let me see if I have this correct...&lt;/P&gt;&lt;P&gt;When I do a 'ca generate rsa key 1024'  the failover pix will do this as well; generating its own key due to the fact that, when I pushed enter, the command was also sent over the failover cable to the secondary PIX unit?&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;When I do a 'ca save all'  the secondary PIX will do the same but save the key that IT generated.&lt;/P&gt;&lt;P&gt;So I should still be able to log into the seconday pix once failed over, having to remove or edit the known_hosts file&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Dec 2002 20:33:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-failover-ssh-key/m-p/158167#M708494</guid>
      <dc:creator>dawsonpa</dc:creator>
      <dc:date>2002-12-06T20:33:23Z</dc:date>
    </item>
    <item>
      <title>Re: Pix failover SSH key</title>
      <link>https://community.cisco.com/t5/network-security/pix-failover-ssh-key/m-p/158168#M708525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Correct. I have to do the same process with mine.. It's a bit of a pain, but hopefully your PIX's don't fail often enough that your always editing the known_hosts file &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Dec 2002 20:36:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-failover-ssh-key/m-p/158168#M708525</guid>
      <dc:creator>dro</dc:creator>
      <dc:date>2002-12-06T20:36:54Z</dc:date>
    </item>
  </channel>
</rss>

