<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-on-asa/m-p/1284822#M76803</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also, on remote ASA I have no debug ssh messages even though debug level is set to 255.&lt;/P&gt;&lt;P&gt;Moreover, when I apply NAT with ssh session already established to remote ASA, connection does not terminate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 06 Jul 2009 08:29:22 GMT</pubDate>
    <dc:creator>fgasimzade</dc:creator>
    <dc:date>2009-07-06T08:29:22Z</dc:date>
    <item>
      <title>SSH on ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-on-asa/m-p/1284821#M76802</link>
      <description>&lt;P&gt;I have a weird problem with ssh configuration on ASA. We have VPN established between 2 ASA's. I configured ssh to the remote ASA's outside interface. I had troubles with ssh unless I regenerated the keys. Now, on local ASA I have configured NAT so that when ssh to the remote ASA to translate local IP addresses to local ASA's outside address. Since that I can not ssh to remote ASA. My ssh client says:&lt;/P&gt;&lt;P&gt;Connecting to host 10.254.17.10:22...&lt;/P&gt;&lt;P&gt;Connected.&lt;/P&gt;&lt;P&gt;Connection closed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had the same message before I regenerated the keys for the first time. No it doesnt help either. If I remove NAT, everything works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here my config of local ASA:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname gyd-asa&lt;/P&gt;&lt;P&gt;enable password XeY1QWHKPK75Y48j encrypted&lt;/P&gt;&lt;P&gt;passwd XeY1QWHKPK75Y48j encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.254.17.9 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; description EIGRP 2008&lt;/P&gt;&lt;P&gt; nameif eigrp &lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.40.50.65 255.255.255.252 &lt;/P&gt;&lt;P&gt;!             &lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.251.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!             &lt;/P&gt;&lt;P&gt;boot system disk0:/asa821-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list 110 extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list nat extended permit tcp any host 10.254.17.10 eq ssh &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu eigrp 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (eigrp) 1 access-list nat&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router eigrp 2008&lt;/P&gt;&lt;P&gt; no auto-summary&lt;/P&gt;&lt;P&gt; neighbor 10.254.17.10 interface outside&lt;/P&gt;&lt;P&gt; neighbor 10.40.50.66 interface eigrp&lt;/P&gt;&lt;P&gt; network 10.40.50.64 255.255.255.252&lt;/P&gt;&lt;P&gt; network 10.254.17.8 255.255.255.248&lt;/P&gt;&lt;P&gt; redistribute connected&lt;/P&gt;&lt;P&gt; redistribute static&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route management 0.0.0.0 0.0.0.0 192.168.251.14 1&lt;/P&gt;&lt;P&gt;route outside 192.1.1.0 255.255.255.0 10.254.17.10 1&lt;/P&gt;&lt;P&gt;route outside 192.168.208.16 255.255.255.240 10.254.17.10 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server TACACS protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS (management) host 192.168.1.8&lt;/P&gt;&lt;P&gt; key *  &lt;/P&gt;&lt;P&gt;aaa-server TACACS (management) host 192.168.22.46&lt;/P&gt;&lt;P&gt; key *  &lt;/P&gt;&lt;P&gt;aaa authentication ssh console TACACS LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console TACACS LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication enable console TACACS LOCAL&lt;/P&gt;&lt;P&gt;aaa accounting ssh console TACACS&lt;/P&gt;&lt;P&gt;aaa accounting telnet console TACACS&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;snmp-server host eigrp 192.168.1.13 poll community vlan&lt;/P&gt;&lt;P&gt;snmp-server host eigrp 192.168.1.27 poll community vlan&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map mymap 10 match address 110&lt;/P&gt;&lt;P&gt;crypto map mymap 10 set peer 10.254.17.10 &lt;/P&gt;&lt;P&gt;crypto map mymap 10 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map mymap interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable eigrp&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 28800&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.192 eigrp&lt;/P&gt;&lt;P&gt;ssh timeout 20&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:41:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-on-asa/m-p/1284821#M76802</guid>
      <dc:creator>fgasimzade</dc:creator>
      <dc:date>2019-03-10T11:41:21Z</dc:date>
    </item>
    <item>
      <title>Re: SSH on ASA</title>
      <link>https://community.cisco.com/t5/network-security/ssh-on-asa/m-p/1284822#M76803</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also, on remote ASA I have no debug ssh messages even though debug level is set to 255.&lt;/P&gt;&lt;P&gt;Moreover, when I apply NAT with ssh session already established to remote ASA, connection does not terminate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jul 2009 08:29:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-on-asa/m-p/1284822#M76803</guid>
      <dc:creator>fgasimzade</dc:creator>
      <dc:date>2009-07-06T08:29:22Z</dc:date>
    </item>
  </channel>
</rss>

