<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH on ASA 5525 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-on-asa-5525/m-p/3767856#M8250</link>
    <description>HI&lt;BR /&gt;I try to ping ip from asa but ping show it me time out</description>
    <pubDate>Fri, 21 Dec 2018 13:29:46 GMT</pubDate>
    <dc:creator>Mirzo</dc:creator>
    <dc:date>2018-12-21T13:29:46Z</dc:date>
    <item>
      <title>SSH on ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/ssh-on-asa-5525/m-p/3767710#M8246</link>
      <description>&lt;P&gt;Dear All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have issue with ssh from asa 5525. I can't to connect my asa via SSH from other network 172.16.1.1.&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I can to&amp;nbsp;connect my asa from Lan Network 172.30.1.1&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you help me How i can to configure my Asa for&amp;nbsp;connect to asa from other network 172.16.1.1&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need some configure my asa directly by SSH from other network 172.16.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you !&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;channel-group 2 mode on&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description LAN Failover Interface&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;channel-group 2 mode on&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;channel-group 2 mode on&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;channel-group 2 mode on&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;channel-group 1 mode active&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;channel-group 1 mode active&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/7&lt;BR /&gt;channel-group 1 mode active&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;management-only&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1&lt;BR /&gt;lacp max-bundle 8&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.10&lt;BR /&gt;vlan 10&lt;BR /&gt;nameif MGMT&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.30.1.254 255.255.255.0 standby 172.30.1.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.20&lt;BR /&gt;vlan 20&lt;BR /&gt;nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.30.2.254 255.255.255.0 standby 172.30.2.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.30&lt;BR /&gt;vlan 30&lt;BR /&gt;nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.30.3.254 255.255.255.0 standby 172.30.3.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.40&lt;BR /&gt;vlan 40&lt;BR /&gt;nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.30.4.254 255.255.255.0 standby 172.30.4.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.50&lt;BR /&gt;vlan 50&lt;BR /&gt;nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.18.5.254 255.255.255.0 standby 172.18.5.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.60&lt;BR /&gt;vlan 60&lt;BR /&gt;nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.30.6.254 255.255.255.0 standby 172.30.6.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.70&lt;BR /&gt;vlan 70&lt;BR /&gt;nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.30.7.254 255.255.255.0 standby 172.30.7.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.80&lt;BR /&gt;vlan 80&lt;BR /&gt;nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.30.8.254 255.255.255.0 standby 172.30.8.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.90&lt;BR /&gt;vlan 90&lt;BR /&gt;nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.30.9.254 255.255.255.0 standby 172.30.9.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.151&lt;BR /&gt;vlan 151&lt;BR /&gt;nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.30.151.254 255.255.255.0 standby 172.30.151.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2&lt;BR /&gt;lacp max-bundle 8&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.60.60.1 255.255.255.0 standby 10.60.60.3&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface failover GigabitEthernet0/1&lt;BR /&gt;failover key *****&lt;BR /&gt;failover interface ip failover 10.50.50.1 255.255.255.252 standby 10.50.50.2&lt;/P&gt;&lt;P&gt;route DMZ 0.0.0.0 0.0.0.0 10.60.60.2 1&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 172.16.1.1 255.255.255.255 DMZ&lt;BR /&gt;ssh 172.30.1.1 255.255.255.255 MGMT&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:35:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-on-asa-5525/m-p/3767710#M8246</guid>
      <dc:creator>Mirzo</dc:creator>
      <dc:date>2020-02-21T16:35:53Z</dc:date>
    </item>
    <item>
      <title>Re: SSH on ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/ssh-on-asa-5525/m-p/3767797#M8248</link>
      <description>&lt;P&gt;hi,&lt;BR /&gt;are you able to ping the IP from ASA. As per your configuration you have already allowed 172.16.1.1 to access via ssh.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Abheesh&lt;/P&gt;</description>
      <pubDate>Fri, 21 Dec 2018 10:16:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-on-asa-5525/m-p/3767797#M8248</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2018-12-21T10:16:41Z</dc:date>
    </item>
    <item>
      <title>Re: SSH on ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/ssh-on-asa-5525/m-p/3767856#M8250</link>
      <description>HI&lt;BR /&gt;I try to ping ip from asa but ping show it me time out</description>
      <pubDate>Fri, 21 Dec 2018 13:29:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-on-asa-5525/m-p/3767856#M8250</guid>
      <dc:creator>Mirzo</dc:creator>
      <dc:date>2018-12-21T13:29:46Z</dc:date>
    </item>
    <item>
      <title>Re: SSH on ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/ssh-on-asa-5525/m-p/3767882#M8252</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;Try to check the reachability from 172.16.1.1 to 10.60.60.2 &amp;amp; 10.60.60.1&lt;/P&gt;
&lt;P&gt;As per you configuration 172.16.1.1 is behind DMZ is that correct...?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Abheesh&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Dec 2018 14:32:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-on-asa-5525/m-p/3767882#M8252</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2018-12-21T14:32:33Z</dc:date>
    </item>
  </channel>
</rss>

