<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to SSH/TELNET/HTTPS to Management interface from outside network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/3378812#M959422</link>
    <description>&lt;P&gt;Thanks Marius,&lt;/P&gt;
&lt;P&gt;As you stated "that the traffic is routed via the switch and then to the mgmt0/0 interface" what kind of route should be done? Since when I tried to add the default gateway for the ASA Mgmt0/0 to the L3 Management VLAN Interface of Switch, It didnt worked.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Sheik Mytheen M&lt;/P&gt;</description>
    <pubDate>Sun, 06 May 2018 09:41:41 GMT</pubDate>
    <dc:creator>shaikk.mydeen</dc:creator>
    <dc:date>2018-05-06T09:41:41Z</dc:date>
    <item>
      <title>Unable to SSH/TELNET/HTTPS to Management interface from outside network</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/3378787#M959420</link>
      <description>&lt;P&gt;I have a ASA 5585 with single slot (No IPS), Simple network, ASA Outside interface connected to Internet /Wan and Inside interface to LAN , ASA Management 0/0 is connected to LAN Access switch Management VLAN.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have allowed any any policy for management interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Able to access the Inside Management VLAN segment from outside network except the ASA Management.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the ASA specifically mentioned external segment IP for ssh, telnet and HTTPS access&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ssh 10.51.x.x 255.255.X.X management&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;telnet 10.51.x.x 255.255.X.X management&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;https 10.51.x.x 255.255.X.X management&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2020 07:35:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/3378787#M959420</guid>
      <dc:creator>shaikk.mydeen</dc:creator>
      <dc:date>2020-02-22T07:35:36Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH/TELNET/HTTPS to Management interface from outside network</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/3378797#M959421</link>
      <description>&lt;P&gt;It looks as though you are trying to access the management interface from the 10.51.x.x network on the Internet/WAN. This will never work as the ASA does not allow traffic to an interface on the ASA that is not the ingress interface.&amp;nbsp; So to access the mgmt0/0 for administrative purposes you will either need to access it from a device on the 10.55.10.x/24 network, or that the traffic is routed via the switch and then to the mgmt0/0 interface.&amp;nbsp; To access the mgmt0/0 from the internet you would need to set up a RA VPN, add the command management-access management (replace management with the name you have given the interface).&amp;nbsp; You would also need to add the command ssh x.x.x.x y.y.y.y management to allow traffic from the VPN IP pool.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Keep in mind that interface access lists such as the any any you added to management interface does not affect "to the box" management traffic.&amp;nbsp; This access list only affects traffic passing through the ASA.&lt;/P&gt;</description>
      <pubDate>Sun, 06 May 2018 07:24:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/3378797#M959421</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-05-06T07:24:41Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH/TELNET/HTTPS to Management interface from outside network</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/3378812#M959422</link>
      <description>&lt;P&gt;Thanks Marius,&lt;/P&gt;
&lt;P&gt;As you stated "that the traffic is routed via the switch and then to the mgmt0/0 interface" what kind of route should be done? Since when I tried to add the default gateway for the ASA Mgmt0/0 to the L3 Management VLAN Interface of Switch, It didnt worked.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Sheik Mytheen M&lt;/P&gt;</description>
      <pubDate>Sun, 06 May 2018 09:41:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/3378812#M959422</guid>
      <dc:creator>shaikk.mydeen</dc:creator>
      <dc:date>2018-05-06T09:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH/TELNET/HTTPS to Management interface from outside network</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/3378827#M959423</link>
      <description>&lt;P&gt;Addition to it...&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please find the routes&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;route outside 0.0.0.0 0.0.0.0 &amp;lt;default gate connected to outside interface&amp;gt;&lt;BR /&gt;route inside 10.55.0.0 255.255.0.0 10.55.1.2 (connected to inside interface)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;as management is directly connected , route addition doesn't affect the packet flow.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;My aim is with the current setup need to access the management from outside network.&lt;/P&gt;</description>
      <pubDate>Sun, 06 May 2018 10:54:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/3378827#M959423</guid>
      <dc:creator>shaikk.mydeen</dc:creator>
      <dc:date>2018-05-06T10:54:38Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH/TELNET/HTTPS to Management interface from outside network</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/3378831#M959424</link>
      <description>&lt;P&gt;did you add a route management 0.0.0.0 0.0.0.0 10.51.10,x&amp;nbsp; ?so it has a way back to a non direct connected subnet?&lt;/P&gt;</description>
      <pubDate>Sun, 06 May 2018 11:13:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/3378831#M959424</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-05-06T11:13:03Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH/TELNET/HTTPS to Management interface from outside network</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/3378832#M959425</link>
      <description>&lt;P&gt;Adding a route to the for management network that points to the inside interface is pointless.&amp;nbsp; A directly connected interface will always be prefered over a route, even if you set the administrative distance to 1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It really depends what you are trying to access on the management interface.&amp;nbsp; If you are trying to manage the ASA via the mgmt interface from the outside network, then you must use a VPN, there really is no other way around this.&amp;nbsp; On the other hand, if you have a jumpstation server on the inside network, you could set up a NAT in the ASA that goes to this jump on port tcp/3389 and then RDP to that server and then manage the ASA from that server.&lt;/P&gt;</description>
      <pubDate>Sun, 06 May 2018 11:16:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/3378832#M959425</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-05-06T11:16:25Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH/TELNET/HTTPS to Management interface from outside network</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/3379045#M959426</link>
      <description>&lt;P&gt;route outside 0.0.0.0 0.0.0.0 (Outside interface connected IP) is configured. Configuring the same for the management interface is not allowed, i.e&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(conf)#route management 0.0.0.0 0.0.0.0 (Outside interface connected IP)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Error: cannot add route entry, conflict with existing routes&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 05:18:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/3379045#M959426</guid>
      <dc:creator>shaikk.mydeen</dc:creator>
      <dc:date>2018-05-07T05:18:25Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH/TELNET/HTTPS to Management interface from outside network</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/3379050#M959427</link>
      <description>&lt;P&gt;Yes this is correct.&amp;nbsp; And if you apply a more general route (ex. /16) and change the administrative distance, the connected route will still be preferred.&lt;/P&gt;
&lt;P&gt;I have provided you with the options to connect to the ASA management interface from the outside network already.&amp;nbsp; Again, they are connect over an RA VPN (AnyConnect) or setup a jumpstation on your inside network.&lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 05:26:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/3379050#M959427</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-05-07T05:26:08Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH/TELNET/HTTPS to Management interface from outside ne</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/5257882#M1119388</link>
      <description>&lt;P&gt;IS this still same logic in latest OS versions?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2025 04:48:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ssh-telnet-https-to-management-interface-from-outside/m-p/5257882#M1119388</guid>
      <dc:creator>sachin garg</dc:creator>
      <dc:date>2025-02-07T04:48:55Z</dc:date>
    </item>
  </channel>
</rss>

