<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH Access to ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423346#M712902</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are those RSA keys already in used for something else?&amp;nbsp; If not, you can do:&amp;nbsp; crypto key zeroize and regenerate the RSA keys.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to SSH fine.&lt;/P&gt;&lt;P&gt;We know the connection is getting to the ASA because you see the log.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you regenerate the RSA keys and attempt the connection?&lt;/P&gt;&lt;P&gt;If it does not work, please post the output of the ''sh run ssh'' command and the public IP address where the SSH client connection is coming from.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 23 Apr 2010 17:54:14 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2010-04-23T17:54:14Z</dc:date>
    <item>
      <title>SSH Access to ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423343#M712879</link>
      <description>&lt;P&gt;I can't access our ASA 5505 via SSH from the outside. I've configured this through the ASDM to allow SSH (Device Management &amp;gt; Management Access &amp;gt; ASDM/HTTPS/Telnet/SSH). I added a rule that allows SSH on the outside interface from 0.0.0.0 0.0.0.0. When I try to ssh in with putty, it says "server unexpectedly closed network connection" When I watch the logs on the ASA, it shows a Built inbound TCP connection on port 22, but then immediately a Teardown TCP connection. It doesn't show it's being blocked by any rule. Is there something I'm missing on enabling SSH?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:36:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423343#M712879</guid>
      <dc:creator>Scott Pazelt</dc:creator>
      <dc:date>2019-03-11T17:36:44Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Access to ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423344#M712885</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Besides allowing the permitted hosts to SSH to the ASA, you need to define RSA keys for the secure connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the CLI:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto key generate rsa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For these key to work, you should have a hostname/domain-name configured on the ASA as well (unless you configure a dedicated RSA keys).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So basically, configure a hostname, domain name and generate the RSA key pair:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname NAME_OF_ASA&lt;/P&gt;&lt;P&gt;domain-name NAME_OF_DOMAIN&lt;/P&gt;&lt;P&gt;crypto key generate rsa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Accept the default of 1024 and it should work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Apr 2010 17:40:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423344#M712885</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-23T17:40:32Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Access to ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423345#M712898</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your response.&lt;/P&gt;&lt;P&gt;I had to enter that command through the ASDM and got the results below. Do I need to replace the existing key?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "crypto key generate rsa"&lt;/P&gt;&lt;P&gt;WARNING: You have a RSA keypair already defined named &lt;DEFAULT-RSA-KEY&gt;.&lt;/DEFAULT-RSA-KEY&gt;&lt;/P&gt;&lt;P&gt;Do you really want to replace them? [yes/no]: &lt;BR /&gt;% Please answer 'yes' or 'no'.&lt;BR /&gt;Do you really want to replace them? [yes/no]: &lt;BR /&gt;% Please answer 'yes' or 'no'.&lt;BR /&gt;Do you really want to replace them? [yes/no]: &lt;BR /&gt;% ERROR: Timed out waiting for a response.&lt;BR /&gt;ERROR: Failed to create new RSA keys named &lt;DEFAULT-RSA-KEY&gt;&lt;/DEFAULT-RSA-KEY&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Apr 2010 17:50:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423345#M712898</guid>
      <dc:creator>Scott Pazelt</dc:creator>
      <dc:date>2010-04-23T17:50:19Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Access to ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423346#M712902</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are those RSA keys already in used for something else?&amp;nbsp; If not, you can do:&amp;nbsp; crypto key zeroize and regenerate the RSA keys.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to SSH fine.&lt;/P&gt;&lt;P&gt;We know the connection is getting to the ASA because you see the log.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you regenerate the RSA keys and attempt the connection?&lt;/P&gt;&lt;P&gt;If it does not work, please post the output of the ''sh run ssh'' command and the public IP address where the SSH client connection is coming from.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Apr 2010 17:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423346#M712902</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-23T17:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Access to ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423347#M712921</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I ran "crypto key zeroize" and removed the key, then ran" crypto key generate rsa" to regenerate the key. I tried ssh'ing back in, but got the same error. I checked the logs and saw the same thing again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the output of sh run ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh scopy enable&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Apr 2010 18:15:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423347#M712921</guid>
      <dc:creator>Scott Pazelt</dc:creator>
      <dc:date>2010-04-23T18:15:17Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Access to ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423348#M712942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I wonder if since I'm running these commands from the ASDM CLI, if they're running all the way. I thought when you run the crypto key generate rsa command it asks you some questions. I didn't get anything returned. Is there a way to pull up an actual cli session from the ASDM?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Apr 2010 18:32:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423348#M712942</guid>
      <dc:creator>Scott Pazelt</dc:creator>
      <dc:date>2010-04-23T18:32:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Access to ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423349#M712957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you're correct and the RSA needs to be done via the CLI.&lt;/P&gt;&lt;P&gt;Can you telnet/SSH to the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cannot be done via ADSM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Apr 2010 18:37:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423349#M712957</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-23T18:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Access to ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423350#M712969</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can't. It's at a remote location in another country so I don't even have physical access. Not sure how I'm going to do this, but thanks for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Apr 2010 18:49:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423350#M712969</guid>
      <dc:creator>Scott Pazelt</dc:creator>
      <dc:date>2010-04-23T18:49:46Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Access to ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423351#M712976</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To be sure, we can run the debug for SSH:&lt;/P&gt;&lt;P&gt;debug ssh 127&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The output of this command should tell us what the problem is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Apr 2010 18:53:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423351#M712976</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-23T18:53:04Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Access to ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423352#M712990</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a way to run this in the ASDM CLI? I tried from but got the message "debug commands are not supported".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Apr 2010 19:09:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423352#M712990</guid>
      <dc:creator>Scott Pazelt</dc:creator>
      <dc:date>2010-04-23T19:09:43Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Access to ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423353#M712998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As far as I've seen you'll need CLI access to enable SSH.&lt;/P&gt;&lt;P&gt;Debugs don't seem to work on ASDM either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apologies, I always use CLI only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Apr 2010 19:27:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423353#M712998</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-23T19:27:39Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Access to ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423354#M713005</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK. I'll see what I can do. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Apr 2010 20:03:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423354#M713005</guid>
      <dc:creator>Scott Pazelt</dc:creator>
      <dc:date>2010-04-23T20:03:49Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Access to ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423355#M713013</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can regenerate the rsa keys from the asdm as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;use the noconfirm keyword at the end of each command (in Multiline, I use following):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;crypto key zero noconfirm&lt;/P&gt;&lt;P&gt;crypto key generate rsa no confirm&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asdm/6_1/release/notes/rn61.html#wp70204" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asdm/6_1/release/notes/rn61.html#wp70204&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ramzi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Feb 2012 16:24:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423355#M713013</guid>
      <dc:creator>rzghadhab</dc:creator>
      <dc:date>2012-02-08T16:24:31Z</dc:date>
    </item>
    <item>
      <title>SSH Access to ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423356#M713016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Be careful with "crypto key zero noconfirm" as it will remove ALL keys you have configured on ASA including 3rd party that might be used. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Feb 2013 16:05:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423356#M713016</guid>
      <dc:creator>gyterpena</dc:creator>
      <dc:date>2013-02-05T16:05:37Z</dc:date>
    </item>
    <item>
      <title>I'm sure you have this</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423357#M713019</link>
      <description>&lt;P&gt;I'm sure you have this figured out by now.&amp;nbsp; But you have to go to Configuration &amp;gt; Device management &amp;gt; Users/AAA &amp;gt; AAA Access and "Enable" SSH and assign to "LOCAL".&amp;nbsp; Doing a Debug ssh 127 will show you keys to the reason.&amp;nbsp; If you are getting a "no AAA" message then your device is trying to use external AAA.&amp;nbsp; Enable it to Local and you are good to go.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Aug 2014 16:25:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423357#M713019</guid>
      <dc:creator>Joseph Dworak</dc:creator>
      <dc:date>2014-08-26T16:25:18Z</dc:date>
    </item>
    <item>
      <title>Correct. It's AAA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423358#M713023</link>
      <description>&lt;P&gt;Correct. It's AAA authentication what is missing.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2015 13:59:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/1423358#M713023</guid>
      <dc:creator>APPIREDDY</dc:creator>
      <dc:date>2015-02-13T13:59:22Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Access to ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/4101641#M1070963</link>
      <description>&lt;P&gt;Morning&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently having problem ssh into my ASA aswell. Any help would be greatly appreciated&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;hostname CASHE-M-ASA&lt;BR /&gt;domain-name USCG&lt;BR /&gt;enable password $sha512$5000$QePGHWSUUC6U3pFSTvMqHA==$/hpBhma3C8/MUSMnk9ghyw== pbkdf2&lt;BR /&gt;names&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.90.185 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name USCG&lt;BR /&gt;access-list OUTSIDE-IN extended permit icmp any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;router ospf 1&lt;BR /&gt;network 192.168.90.0 255.255.255.0 area 0&lt;BR /&gt;log-adj-changes&lt;BR /&gt;!&lt;BR /&gt;route outside 192.168.83.0 255.255.255.0 192.168.90.186 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.83.0 255.255.255.0 outside&lt;BR /&gt;ssh 192.168.90.0 255.255.255.0 outside&lt;BR /&gt;ssh 192.168.90.184 255.255.255.252 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh cipher encryption high&lt;BR /&gt;ssh cipher integrity high&lt;BR /&gt;ssh key-exchange group dh-group14-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.83.0&lt;BR /&gt;!&lt;BR /&gt;dhcpd dns 192.168.83.0 interface outside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username spawar password $sha512$5000$iW9kLubyKfl/OHZ7ZvzKCA==$a7ONgvEnBhlmMUyzgZPN1Q== pbkdf2&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:dbcedd7f9fc5f14cc980dd87cc74b4b6&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jun 2020 15:56:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/4101641#M1070963</guid>
      <dc:creator>blake.d.green.mil1</dc:creator>
      <dc:date>2020-06-11T15:56:34Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Access to ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/4827777#M1100135</link>
      <description>&lt;P&gt;I know this is an old thread but I have another suggestion which may help someone in future.&amp;nbsp; I ran into the exact same issue.&amp;nbsp; Was setting up a brand new ASA but for the life of me couldn't SSH into the device.&amp;nbsp; I then went under Configuration &amp;gt; Device Management &amp;gt; Advanced &amp;gt; SSH Ciphers and set the CipherSecurity Level to ALL for both Encryption and Integrity.&amp;nbsp; Hit Apply and when I tried to SSH, I got the prompt to Accept the certificate. After I got connected, I went back to ASDM and set the Ciper Security Level back to Medium.&amp;nbsp; Tried to SSH again and it worked each time.&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2023 15:39:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/4827777#M1100135</guid>
      <dc:creator>Ricky Sandhu</dc:creator>
      <dc:date>2023-05-03T15:39:55Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Access to ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/5113725#M1112877</link>
      <description>&lt;P&gt;I was able to do this in the ASDM GUI by typing&lt;BR /&gt;"crypto key gen rsa mod 2048 noconfirm" and this allowed me to accept/skip the Yes/No Dialogue. I was able to CLI SSH after that.&lt;BR /&gt;__&lt;BR /&gt;Wow, that was 14 years ago. Cheers if your still looking.&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2024 20:45:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-asa/m-p/5113725#M1112877</guid>
      <dc:creator>jrharmdx</dc:creator>
      <dc:date>2024-05-22T20:45:12Z</dc:date>
    </item>
  </channel>
</rss>

