<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ssh connection is reseted in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-connection-is-reseted/m-p/1408447#M747133</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;ssh connection goes from server1 to server2, between servers is&amp;nbsp; IPSec tunnel ASA1- ASA2&lt;/P&gt;&lt;P&gt;But connection is reseted, i have tis log message on ASA1&lt;/P&gt;&lt;P&gt;%PIX|&lt;EM&gt;ASA&lt;/EM&gt;-2-&lt;EM&gt;106001&lt;/EM&gt;: Inbound TCP connection denied from&amp;nbsp; IP_address/port to IP_address/port flags tcp_flags on interface&amp;nbsp; interface_name&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;flag is SYN&lt;/P&gt;&lt;P&gt;what should be a reason of reset ssh?&lt;/P&gt;&lt;P&gt;access-list contains ssh between nodes, so reason can not be in access-list&lt;/P&gt;&lt;P&gt;ASA1 has ver 8.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;peter&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 17:35:50 GMT</pubDate>
    <dc:creator>pslavkovsky</dc:creator>
    <dc:date>2019-03-11T17:35:50Z</dc:date>
    <item>
      <title>ssh connection is reseted</title>
      <link>https://community.cisco.com/t5/network-security/ssh-connection-is-reseted/m-p/1408447#M747133</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;ssh connection goes from server1 to server2, between servers is&amp;nbsp; IPSec tunnel ASA1- ASA2&lt;/P&gt;&lt;P&gt;But connection is reseted, i have tis log message on ASA1&lt;/P&gt;&lt;P&gt;%PIX|&lt;EM&gt;ASA&lt;/EM&gt;-2-&lt;EM&gt;106001&lt;/EM&gt;: Inbound TCP connection denied from&amp;nbsp; IP_address/port to IP_address/port flags tcp_flags on interface&amp;nbsp; interface_name&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;flag is SYN&lt;/P&gt;&lt;P&gt;what should be a reason of reset ssh?&lt;/P&gt;&lt;P&gt;access-list contains ssh between nodes, so reason can not be in access-list&lt;/P&gt;&lt;P&gt;ASA1 has ver 8.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;peter&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:35:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-connection-is-reseted/m-p/1408447#M747133</guid>
      <dc:creator>pslavkovsky</dc:creator>
      <dc:date>2019-03-11T17:35:50Z</dc:date>
    </item>
    <item>
      <title>Re: ssh connection is reseted</title>
      <link>https://community.cisco.com/t5/network-security/ssh-connection-is-reseted/m-p/1408448#M747139</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Peter, can you share the configuration of the both ASA's? That will help in figuring why the ASA denies/drops the SYN packet from your ssh connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dmitry.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Apr 2010 14:52:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-connection-is-reseted/m-p/1408448#M747139</guid>
      <dc:creator>dtochilovsky</dc:creator>
      <dc:date>2010-04-22T14:52:19Z</dc:date>
    </item>
    <item>
      <title>Re: ssh connection is reseted</title>
      <link>https://community.cisco.com/t5/network-security/ssh-connection-is-reseted/m-p/1408449#M747143</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can check if you have command "service resetinbound" or "outbound" in your config.&lt;/P&gt;&lt;P&gt;An IPS module on the ASA could also send the RST.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Apr 2010 21:24:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-connection-is-reseted/m-p/1408449#M747143</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-04-22T21:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: ssh connection is reseted</title>
      <link>https://community.cisco.com/t5/network-security/ssh-connection-is-reseted/m-p/1408450#M747148</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA 5520 supports ASDM management which is GUI based tool. This provides packet tracer tool&lt;/P&gt;&lt;P&gt;where you can define source IP, Destination IP, source Interface, Source Port, and Destination Port. This will help you to identify where exactly problem you have. The problem appears to be in reverse NAT or security policy. This would be more clarified by information shared in document&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/partner/products/ps6120/products_tech_note09186a00809763ea.shtml"&gt;http://www.cisco.com/en/US/partner/products/ps6120/products_tech_note09186a00809763ea.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;PRE&gt;&lt;STRONG&gt;%PIX|ASA-2-106001: Inbound TCP connection denied from IP_address/port 
to IP_address/port flags tcp_flags on interface interface_name&lt;/STRONG&gt;
&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;STRONG&gt;Explanation&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;This is a connection-related message. This message occurs when an attempt to connect to an inside address is denied by the security policy that is defined for the specified traffic type. Possible &lt;EM&gt;tcp_flags&lt;/EM&gt; values correspond to the flags in the TCP header that were present when the connection was denied. For example, a TCP packet arrived for which no connection state exists in the security appliance, and it was dropped. The &lt;EM&gt;tcp_flags&lt;/EM&gt; in this packet are FIN and ACK.&lt;/P&gt;&lt;P&gt;The &lt;EM&gt;tcp_flags&lt;/EM&gt; are as follows:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;ACK—The acknowledgment number was received.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;FIN—Data was sent.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;PSH—The receiver passed data to the application.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;RST—The connection was reset.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;SYN—Sequence numbers were synchronized to start a connection.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;URG—The urgent pointer was declared valid.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;There are many reasons for static translation to fail on the PIX/ASA. But, a common reason is if the demilitarized zone (DMZ) interface is configured with the same security level (0) as the outside interface.&lt;/P&gt;&lt;P&gt;In order to resolve this issue, assign a different security level to all interfaces&lt;/P&gt;&lt;P&gt;Refer to &lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/intparam.html"&gt;Configuring Interface Parameters&lt;/A&gt; for more information.&lt;/P&gt;&lt;P&gt;This error message also appears if an external device sends an IDENT packet to the internal client, which is dropped by the PIX Firewall. Refer to &lt;A href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094317.shtml"&gt;PIX Performance Issues Caused by IDENT Protocol&lt;/A&gt; for more information &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Apr 2010 21:47:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-connection-is-reseted/m-p/1408450#M747148</guid>
      <dc:creator>shailesh.h</dc:creator>
      <dc:date>2010-04-22T21:47:59Z</dc:date>
    </item>
  </channel>
</rss>

