<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 8.2(5) can't ssh from NAT'ed IP address in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-8-2-5-can-t-ssh-from-nat-ed-ip-address/m-p/2772643#M916427</link>
    <description>&lt;P&gt;Hello - wondering if someone&amp;nbsp;can tell me if there's a bug in the 8.2(5) code (I'm running the latest build, #58) related to ssh'ing into the appliance from a NAT'ed ip address.&lt;/P&gt;
&lt;P&gt;My setup is like this:&lt;/P&gt;
&lt;P&gt;my workstation (192.168.1.1)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;|&lt;/P&gt;
&lt;P&gt;ASA 5585-X (nats 192.168.1.1 to 10.1.1.1)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;|&lt;/P&gt;
&lt;P&gt;ASA 5505 10.2.2.2&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;On the 5585 side, here is the packet trace:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;1: 09:57:43.317229 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: S 1546719477:1546719477(0) win 8192 &amp;lt;mss 1380,nop,wscale 2,nop,nop,sackOK&amp;gt; &lt;BR /&gt; 2: 09:57:43.317946 10.2.2.2.22 &amp;gt; 10.1.1.1.33728: S 692254474:692254474(0) ack 1546719478 win 8192 &amp;lt;mss 1380&amp;gt; &lt;BR /&gt; 3: 09:57:43.318312 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: . ack 692254475 win 64860 &lt;BR /&gt; 4: 09:57:43.318388 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 1546719478:1546719529(51) ack 692254475 win 64860 &lt;BR /&gt; 5: 09:57:43.615980 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 1546719478:1546719529(51) ack 692254475 win 64860 &lt;BR /&gt; 6: 09:57:44.215976 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 1546719478:1546719529(51) ack 692254475 win 64860 &lt;BR /&gt; 7: 09:57:45.416024 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 1546719478:1546719529(51) ack 692254475 win 64860 &lt;BR /&gt; 8: 09:57:47.824664 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 1546719478:1546719529(51) ack 692254475 win 64860 &lt;BR /&gt; 9: 09:57:52.626829 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 1546719478:1546719529(51) ack 692254475 win 64860 &lt;BR /&gt;10: 09:58:02.232348 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: R 1546719529:1546719529(0) ack 692254475 win 0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;And here's the trace on the 5505 side:&lt;/P&gt;
&lt;P&gt;1: 09:57:43.291717 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: S 2937505576:2937505576(0) win 8192 &amp;lt;mss 1380,nop,wscale 2,nop,nop,sackOK&amp;gt; &lt;BR /&gt; 2: 09:57:43.291809 10.2.2.2.22 &amp;gt; 10.1.1.1.33728: S 25078042:25078042(0) ack 2937505577 win 8192 &amp;lt;mss 1380&amp;gt; &lt;BR /&gt; 3: 09:57:43.292709 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: . ack 25078043 win 64860 &lt;BR /&gt; 4: 09:57:43.292877 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 2937505577:2937505628(51) ack 25078043 win 64860 &lt;BR /&gt; 5: 09:57:43.590377 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 2937505577:2937505628(51) ack 25078043 win 64860 &lt;BR /&gt; 6: 09:57:44.190343 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 2937505577:2937505628(51) ack 25078043 win 64860 &lt;BR /&gt; 7: 09:57:45.390375 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 2937505577:2937505628(51) ack 25078043 win 64860 &lt;BR /&gt; 8: 09:57:47.798954 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 2937505577:2937505628(51) ack 25078043 win 64860 &lt;BR /&gt; 9: 09:57:52.601027 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 2937505577:2937505628(51) ack 25078043 win 64860 &lt;BR /&gt; 10: 09:58:02.206364 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: R 2937505628:2937505628(0) ack 25078043 win 0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is the log from the 5585:&lt;/P&gt;
&lt;P&gt;%ASA-6-305011: Built dynamic TCP translation from any:192.168.1.1/59017 to any:10.1.1.1/59017&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 1008925 for outside:192.168.1.1/59017 (10.1.1.1/59017) to outside:10.2.2.2/22 (10.2.2.2/22)&lt;BR /&gt;%ASA-6-305012: Teardown dynamic TCP translation from any:192.168.1.1/59017 to any:10.1.1.1/59017 duration 0:00:18&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;And the log from the 5505:&lt;/P&gt;
&lt;P&gt;%ASA-7-609001: Built local-host outside:10.1.1.1&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 10.1.1.1/59017 to outside:10.2.2.2/22&lt;BR /&gt;%ASA-7-609002: Teardown local-host outside:10.1.1.1 duration 0:00:00&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 10.1.1.1/59017 to 10.2.2.2/22 flags RST ACK on interface outside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This used to work when I was running the 7.2(5)15 code on the 5505, but has since broken after I upgraded it to the 8.2(5)58 code.&lt;/P&gt;
&lt;P&gt;If I remove the NAT on the 5585, I can connect to the machine directly, but it is a business requirement that i use NAT to connect -- I'm being temporarily allowed to connect directly to the 5505 with my workstation for testing.&lt;/P&gt;
&lt;P&gt;Any help would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;thanks,&lt;/P&gt;
&lt;P&gt;Mike&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 13:36:29 GMT</pubDate>
    <dc:creator>ippolito</dc:creator>
    <dc:date>2020-02-21T13:36:29Z</dc:date>
    <item>
      <title>ASA 8.2(5) can't ssh from NAT'ed IP address</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-2-5-can-t-ssh-from-nat-ed-ip-address/m-p/2772643#M916427</link>
      <description>&lt;P&gt;Hello - wondering if someone&amp;nbsp;can tell me if there's a bug in the 8.2(5) code (I'm running the latest build, #58) related to ssh'ing into the appliance from a NAT'ed ip address.&lt;/P&gt;
&lt;P&gt;My setup is like this:&lt;/P&gt;
&lt;P&gt;my workstation (192.168.1.1)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;|&lt;/P&gt;
&lt;P&gt;ASA 5585-X (nats 192.168.1.1 to 10.1.1.1)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;|&lt;/P&gt;
&lt;P&gt;ASA 5505 10.2.2.2&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;On the 5585 side, here is the packet trace:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;1: 09:57:43.317229 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: S 1546719477:1546719477(0) win 8192 &amp;lt;mss 1380,nop,wscale 2,nop,nop,sackOK&amp;gt; &lt;BR /&gt; 2: 09:57:43.317946 10.2.2.2.22 &amp;gt; 10.1.1.1.33728: S 692254474:692254474(0) ack 1546719478 win 8192 &amp;lt;mss 1380&amp;gt; &lt;BR /&gt; 3: 09:57:43.318312 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: . ack 692254475 win 64860 &lt;BR /&gt; 4: 09:57:43.318388 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 1546719478:1546719529(51) ack 692254475 win 64860 &lt;BR /&gt; 5: 09:57:43.615980 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 1546719478:1546719529(51) ack 692254475 win 64860 &lt;BR /&gt; 6: 09:57:44.215976 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 1546719478:1546719529(51) ack 692254475 win 64860 &lt;BR /&gt; 7: 09:57:45.416024 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 1546719478:1546719529(51) ack 692254475 win 64860 &lt;BR /&gt; 8: 09:57:47.824664 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 1546719478:1546719529(51) ack 692254475 win 64860 &lt;BR /&gt; 9: 09:57:52.626829 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 1546719478:1546719529(51) ack 692254475 win 64860 &lt;BR /&gt;10: 09:58:02.232348 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: R 1546719529:1546719529(0) ack 692254475 win 0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;And here's the trace on the 5505 side:&lt;/P&gt;
&lt;P&gt;1: 09:57:43.291717 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: S 2937505576:2937505576(0) win 8192 &amp;lt;mss 1380,nop,wscale 2,nop,nop,sackOK&amp;gt; &lt;BR /&gt; 2: 09:57:43.291809 10.2.2.2.22 &amp;gt; 10.1.1.1.33728: S 25078042:25078042(0) ack 2937505577 win 8192 &amp;lt;mss 1380&amp;gt; &lt;BR /&gt; 3: 09:57:43.292709 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: . ack 25078043 win 64860 &lt;BR /&gt; 4: 09:57:43.292877 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 2937505577:2937505628(51) ack 25078043 win 64860 &lt;BR /&gt; 5: 09:57:43.590377 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 2937505577:2937505628(51) ack 25078043 win 64860 &lt;BR /&gt; 6: 09:57:44.190343 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 2937505577:2937505628(51) ack 25078043 win 64860 &lt;BR /&gt; 7: 09:57:45.390375 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 2937505577:2937505628(51) ack 25078043 win 64860 &lt;BR /&gt; 8: 09:57:47.798954 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 2937505577:2937505628(51) ack 25078043 win 64860 &lt;BR /&gt; 9: 09:57:52.601027 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: P 2937505577:2937505628(51) ack 25078043 win 64860 &lt;BR /&gt; 10: 09:58:02.206364 10.1.1.1.33728 &amp;gt; 10.2.2.2.22: R 2937505628:2937505628(0) ack 25078043 win 0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is the log from the 5585:&lt;/P&gt;
&lt;P&gt;%ASA-6-305011: Built dynamic TCP translation from any:192.168.1.1/59017 to any:10.1.1.1/59017&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 1008925 for outside:192.168.1.1/59017 (10.1.1.1/59017) to outside:10.2.2.2/22 (10.2.2.2/22)&lt;BR /&gt;%ASA-6-305012: Teardown dynamic TCP translation from any:192.168.1.1/59017 to any:10.1.1.1/59017 duration 0:00:18&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;And the log from the 5505:&lt;/P&gt;
&lt;P&gt;%ASA-7-609001: Built local-host outside:10.1.1.1&lt;BR /&gt;%ASA-7-710005: TCP request discarded from 10.1.1.1/59017 to outside:10.2.2.2/22&lt;BR /&gt;%ASA-7-609002: Teardown local-host outside:10.1.1.1 duration 0:00:00&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from 10.1.1.1/59017 to 10.2.2.2/22 flags RST ACK on interface outside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This used to work when I was running the 7.2(5)15 code on the 5505, but has since broken after I upgraded it to the 8.2(5)58 code.&lt;/P&gt;
&lt;P&gt;If I remove the NAT on the 5585, I can connect to the machine directly, but it is a business requirement that i use NAT to connect -- I'm being temporarily allowed to connect directly to the 5505 with my workstation for testing.&lt;/P&gt;
&lt;P&gt;Any help would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;thanks,&lt;/P&gt;
&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:36:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-2-5-can-t-ssh-from-nat-ed-ip-address/m-p/2772643#M916427</guid>
      <dc:creator>ippolito</dc:creator>
      <dc:date>2020-02-21T13:36:29Z</dc:date>
    </item>
    <item>
      <title>Hi Mike,</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-2-5-can-t-ssh-from-nat-ed-ip-address/m-p/2772644#M916430</link>
      <description>&lt;P&gt;Hi Mike,&lt;/P&gt;
&lt;P&gt;on the 5505, do you allow ssh from 10.1.1.1 on the outside interface (ssh 10.1.1.1 255.255.255.255 outside)?&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;TCP request discarded from 10.1.1.1/59017 to outside:10.2.2.2/22&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Also, what is the IP of the 5505 that faces the other ASA 5585-X? I mean on the inside interface?&amp;nbsp;it looks like you are trying to connect to a far interface and being dropped which is normal; ASA cannot be managed through a farside interface unless you use the command &amp;lt;management-access&amp;nbsp;outside&amp;gt;&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/adaptive-security-device-manager/118092-configure-asa-00.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If this is your setup:&lt;/P&gt;
&lt;P&gt;my workstation (192.168.1.1)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;|&lt;/P&gt;
&lt;P&gt;ASA 5585-X (nats 192.168.1.1 to 10.1.1.1)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;|&lt;/P&gt;
&lt;P&gt;ASA 5505 10.1.1.2 (inside)&lt;/P&gt;
&lt;P&gt;10.2.2.2 (outside)&lt;/P&gt;
&lt;P&gt;then allow ssh to inside interface (ssh 10.1.1.1 255.255.255.255 inside) and use IP 10.1.1.2 to connect to the 5505 instead of outside interface IP...&lt;/P&gt;
&lt;P&gt;Patrick&lt;/P&gt;</description>
      <pubDate>Tue, 10 Nov 2015 15:57:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-2-5-can-t-ssh-from-nat-ed-ip-address/m-p/2772644#M916430</guid>
      <dc:creator>Patrick Moubarak</dc:creator>
      <dc:date>2015-11-10T15:57:14Z</dc:date>
    </item>
    <item>
      <title>Hi Patrick,</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-2-5-can-t-ssh-from-nat-ed-ip-address/m-p/2772645#M916432</link>
      <description>&lt;P&gt;Hi Patrick,&lt;/P&gt;
&lt;P&gt;I do have&amp;nbsp;&lt;SPAN&gt;ssh 10.1.1.1 255.255.255.255 outside.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I think you're on to something with the management-access command -- I'll try that and see if it works.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks for your input on this!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Mike&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Nov 2015 18:24:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-2-5-can-t-ssh-from-nat-ed-ip-address/m-p/2772645#M916432</guid>
      <dc:creator>ippolito</dc:creator>
      <dc:date>2015-11-17T18:24:56Z</dc:date>
    </item>
  </channel>
</rss>

