<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5510 ssh in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-ssh/m-p/1003402#M941394</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;when i try to connect i get this on router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2801#ssh -v 1 -l local 192.168.250.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Connection to 192.168.250.5 aborted: error status 33]&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 07 Mar 2008 14:23:21 GMT</pubDate>
    <dc:creator>aadilovic</dc:creator>
    <dc:date>2008-03-07T14:23:21Z</dc:date>
    <item>
      <title>ASA 5510 ssh</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ssh/m-p/1003398#M941390</link>
      <description>&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;i have router 2801 which is connected to ASA to Outside interface, and have problem with ssh ver 1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh ssh&lt;/P&gt;&lt;P&gt;0.0.0.0 0.0.0.0 Inside&lt;/P&gt;&lt;P&gt;0.0.0.0 0.0.0.0 Outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any suggestions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please-thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:13:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ssh/m-p/1003398#M941390</guid>
      <dc:creator>aadilovic</dc:creator>
      <dc:date>2019-03-11T12:13:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ssh</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ssh/m-p/1003399#M941391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;have you generated your ssh keys on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try this command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto key generate rsa modulus 1024&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Mar 2008 16:06:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ssh/m-p/1003399#M941391</guid>
      <dc:creator>brettmilborrow</dc:creator>
      <dc:date>2008-03-06T16:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ssh</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ssh/m-p/1003400#M941392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes i do...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and security-level on out interface is 50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from inside its work&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Mar 2008 16:33:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ssh/m-p/1003400#M941392</guid>
      <dc:creator>aadilovic</dc:creator>
      <dc:date>2008-03-06T16:33:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ssh</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ssh/m-p/1003401#M941393</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;try running:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;'debug ssh'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And then attempt to connect to the firewall using ssh. This may give a clue why the session is failing. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Mar 2008 16:37:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ssh/m-p/1003401#M941393</guid>
      <dc:creator>brettmilborrow</dc:creator>
      <dc:date>2008-03-06T16:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ssh</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ssh/m-p/1003402#M941394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;when i try to connect i get this on router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2801#ssh -v 1 -l local 192.168.250.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Connection to 192.168.250.5 aborted: error status 33]&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Mar 2008 14:23:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ssh/m-p/1003402#M941394</guid>
      <dc:creator>aadilovic</dc:creator>
      <dc:date>2008-03-07T14:23:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ssh</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ssh/m-p/1003403#M941395</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you run the 'debug ssh' command on the firewall whilst you try to connect.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Mar 2008 23:42:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ssh/m-p/1003403#M941395</guid>
      <dc:creator>brettmilborrow</dc:creator>
      <dc:date>2008-03-07T23:42:40Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 ssh</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ssh/m-p/1003404#M941396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had a similar problem with an ASA5510 (192.168.50.206)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!------------------------------&lt;/P&gt;&lt;P&gt;Switch#ssh -l admin 192.168.50.206&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;[Connection to 192.168.50.206 aborted: error status 34]&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;!-----------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;after generating a new cert and changing ssh ver to 2 the problem disapeared. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure if this is an option for you but I know there are some vulnerabilitys in ssh v1 as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;DGW&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Oct 2013 02:34:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ssh/m-p/1003404#M941396</guid>
      <dc:creator>dylan.webb</dc:creator>
      <dc:date>2013-10-17T02:34:35Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 ssh</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ssh/m-p/1003405#M941397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Dylan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember that SSH version 1 uses 768 bits for the rsa key&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh -v 1 -l username&amp;nbsp; IP address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure you have configured the ASA to use Version 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA&lt;SPAN style="font-size: 10pt;"&gt;(config)# ssh version 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Oct 2013 04:49:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ssh/m-p/1003405#M941397</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-10-17T04:49:05Z</dc:date>
    </item>
  </channel>
</rss>

