<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA SSH Over IPSec VPN Tunnel in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343191#M967975</link>
    <description>&lt;P&gt;You need to have a NAT policy with route-lookup option in place.&lt;/P&gt;
&lt;P&gt;Identity NAT example:&lt;/P&gt;
&lt;P&gt;nat (INSIDE,OUTSIDE) source static OBJ-LOCAL&amp;nbsp;&lt;SPAN&gt;OBJ-LOCAL&amp;nbsp;destination static OBJ-REMOTE OBJ-REMOTE no-proxy-arp route-lookup&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Bogdan&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 06 Mar 2018 14:03:42 GMT</pubDate>
    <dc:creator>Bogdan Nita</dc:creator>
    <dc:date>2018-03-06T14:03:42Z</dc:date>
    <item>
      <title>Cisco ASA SSH Over IPSec VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343020#M967966</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;We have a cisco asa 5510 Firewall running the latest version&amp;nbsp;9.1(7)23 connected to our Office through an IPSec VPN Tunnel, and we are trying to configure a new management machine to connect remotly to the management ip address of the firewall, the traffic is reaching the management ip and so en domain encryption is working fine, and traffic is being tunnelled through IPSec, but when SSH traffic is hitting the firewall is being dropped and we have below logs :&lt;BR /&gt;&lt;BR /&gt;fw01# show logging | include 10.49.3&lt;BR /&gt;Feb 08 2018 19:34:42: %ASA-7-609001: Built local-host outside:10.49.3.27&lt;BR /&gt;Feb 08 2018 19:34:42: %ASA-6-302013: Built inbound TCP connection 929708 for outside:10.49.3.27/41466 (10.49.3.27/41466) to identity:10.215.80.62/22 (10.215.80.62/22)&lt;BR /&gt;Feb 08 2018 19:34:42: %ASA-6-302014: Teardown TCP connection 929708 for outside:10.49.3.27/41466 to identity:10.215.80.62/22 duration 0:00:00 bytes 0 Flow terminated by TCP Intercept&lt;BR /&gt;Feb 08 2018 19:34:42: %ASA-7-609002: Teardown local-host outside:10.49.3.27 duration 0:00:00&lt;BR /&gt;Feb 08 2018 19:34:43: %ASA-7-609001: Built local-host outside:10.49.3.27&lt;BR /&gt;Feb 08 2018 19:34:43: %ASA-6-302013: Built inbound TCP connection 929712 for outside:10.49.3.27/41466 (10.49.3.27/41466) to identity:10.215.80.62/22 (10.215.80.62/22)&lt;BR /&gt;Feb 08 2018 19:34:43: %ASA-6-302014: Teardown TCP connection 929712 for outside:10.49.3.27/41466 to identity:10.215.80.62/22 duration 0:00:00 bytes 0 Flow terminated by TCP Intercept&lt;BR /&gt;Feb 08 2018 19:34:43: %ASA-7-609002: Teardown local-host outside:10.49.3.27 duration 0:00:00&lt;BR /&gt;Feb 08 2018 19:34:43: %ASA-6-106015: Deny TCP (no connection) from 10.215.80.62/22 to 10.49.3.27/41466 flags SYN ACK on interface outside&lt;BR /&gt;fw01#&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ip address of the remote management machine 10.49.3.27&lt;/P&gt;
&lt;P&gt;Management ip address of the firewall 10.215.80.62&lt;BR /&gt;We have alrady tried to remove and reconfigure&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;management-access inside&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;CODE&gt;But SSH is still failling.&lt;BR /&gt;Thank you&lt;/CODE&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:28:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343020#M967966</guid>
      <dc:creator>Neji Jihed</dc:creator>
      <dc:date>2020-02-21T15:28:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA SSH Over IPSec VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343075#M967967</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/288483"&gt;@Neji Jihed&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;try adding&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ssh 10.49.3.0 255.255.255.0 inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please mark it as answered, if your querry is resolved. Appreciate your time!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Mar 2018 10:40:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343075#M967967</guid>
      <dc:creator>M Mohammed</dc:creator>
      <dc:date>2018-03-06T10:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA SSH Over IPSec VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343133#M967969</link>
      <description>&lt;P&gt;Did already but SSH is still failing, forgot to mention that in the topic,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 06 Mar 2018 12:26:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343133#M967969</guid>
      <dc:creator>Neji Jihed</dc:creator>
      <dc:date>2018-03-06T12:26:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA SSH Over IPSec VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343191#M967975</link>
      <description>&lt;P&gt;You need to have a NAT policy with route-lookup option in place.&lt;/P&gt;
&lt;P&gt;Identity NAT example:&lt;/P&gt;
&lt;P&gt;nat (INSIDE,OUTSIDE) source static OBJ-LOCAL&amp;nbsp;&lt;SPAN&gt;OBJ-LOCAL&amp;nbsp;destination static OBJ-REMOTE OBJ-REMOTE no-proxy-arp route-lookup&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Bogdan&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Mar 2018 14:03:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343191#M967975</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-03-06T14:03:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA SSH Over IPSec VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343195#M967978</link>
      <description>&lt;P&gt;Already there as well.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Mar 2018 14:06:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343195#M967978</guid>
      <dc:creator>Neji Jihed</dc:creator>
      <dc:date>2018-03-06T14:06:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA SSH Over IPSec VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343209#M967980</link>
      <description>&lt;P&gt;That is weird, the&amp;nbsp;logs you posted are indicating that the packets are not being sent to the correct interface.&lt;/P&gt;
&lt;P&gt;Are you sure the ips specified in the nat rule include &lt;SPAN&gt;10.49.3.27 and&amp;nbsp;10.215.80.62 ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Are there other nat rules above that could disturb the route lookup rule? If so you can move the route lookup nat rule to the first position.&lt;/P&gt;
&lt;P&gt;Are you able to ping ? You may need to inspect icmp and allow icmp to the management interface.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Mar 2018 14:18:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343209#M967980</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-03-06T14:18:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA SSH Over IPSec VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343256#M967983</link>
      <description>&lt;P&gt;Here is the NAT rule :&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;nat (inside,any) source static obj-10.215.80.0 obj-10.215.80.0 destination static obj-10.49.3.0 obj-10.49.3.0 no-proxy-arp route-lookup&lt;/CODE&gt;&lt;/PRE&gt;
&lt;PRE&gt;&lt;CODE&gt;object network obj-10.215.80.0
&lt;/CODE&gt;&lt;CODE&gt; subnet 10.215.80.0 255.255.255.192&lt;/CODE&gt;&lt;/PRE&gt;
&lt;PRE&gt;&lt;CODE&gt;object network obj-10.49.3.0
&lt;/CODE&gt;&lt;CODE&gt; subnet 10.49.3.0 255.255.255.0&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;CODE&gt;There two NAT rules before this one which are doing same thing (management with route-lookup in plac&lt;/CODE&gt;&lt;CODE&gt;) and they are working fine.&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Mar 2018 14:52:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343256#M967983</guid>
      <dc:creator>Neji Jihed</dc:creator>
      <dc:date>2018-03-06T14:52:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA SSH Over IPSec VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343301#M967987</link>
      <description>&lt;P&gt;NAT seems ok.&lt;/P&gt;
&lt;P&gt;I had a better look at the logs and it seems that ssh session is blocked, but the ssh command should allow access.&lt;/P&gt;
&lt;P&gt;There is a bug that you may be hitting:&amp;nbsp;&lt;SPAN&gt;CSCta05045&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Can you try:&lt;/P&gt;
&lt;P&gt;no management-access inside&lt;BR /&gt;management-access inside&lt;/P&gt;</description>
      <pubDate>Tue, 06 Mar 2018 15:27:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343301#M967987</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-03-06T15:27:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA SSH Over IPSec VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343308#M967988</link>
      <description>&lt;P&gt;I am aware about the Bug, i have also tried the management-console trick but it did not work.&lt;/P&gt;
&lt;P&gt;I even updated the firewall to the latest version,&lt;BR /&gt;&lt;BR /&gt;i am out of thoughts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Mar 2018 15:32:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/3343308#M967988</guid>
      <dc:creator>Neji Jihed</dc:creator>
      <dc:date>2018-03-06T15:32:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA SSH Over IPSec VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/4008572#M967991</link>
      <description>&lt;P&gt;I've run into this same issue and tried what the prior user is attempting and can't get ssh access to the inside interface over the vpn. any updates on this?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 05:37:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/4008572#M967991</guid>
      <dc:creator>Jesse Shumaker</dc:creator>
      <dc:date>2020-01-09T05:37:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA SSH Over IPSec VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/5070027#M1111288</link>
      <description>&lt;P&gt;This one resolved my issue today. I'm on version ASA 9.12(4)62.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 21:23:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssh-over-ipsec-vpn-tunnel/m-p/5070027#M1111288</guid>
      <dc:creator>Reynaldo.Lopez.A</dc:creator>
      <dc:date>2024-04-15T21:23:16Z</dc:date>
    </item>
  </channel>
</rss>

