09-15-2025 04:14 PM
Hey there.
Im trying to setup a management VLAN on my Switch downstairs through my ASA thats on my same network but im having the address on another network so its routed through the ASA to harden up SSH to my address only.
Some rough config is
Management vlan 999 on switch at 10.0.200.250 I can ping this from my PC and the ASA. I cannot SSH into it
I can ssh into its other ip via layer 2 when im on the same network. EG 10.10.10.* Which is why i wanted it to be address based only to harden it up.
My ruling of Source Address *Mine* Dest 10.0.200.250 ssh permit as rule 1
any Source Address, Dest 10.0.200.250 ssh deny is second. Even when ive disabled this I cannot SSH into it..
Just wondering if i could of missed something? It worked for the other address I had on a different network but its not on this one.
Cheers
09-15-2025 07:33 PM
debug3: kex names ok: [diffie-hellman-group1-sha1] debug3: kex names ok: [diffie-hellman-group1-sha1] debug3: Failed to open file:C:/ProgramData/ssh/ssh_config error:2 debug2: resolve_canonicalize: hostname 10.0.200.250 is address debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> 'C:\\Users\\davie/.ssh/known_hosts' debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> 'C:\\Users\\davie/.ssh/known_hosts2' debug3: ssh_connect_direct: entering debug1: Connecting to 10.0.200.250 [10.0.200.250] port 22. debug3: finish_connect - ERROR: async io completed with error: 10060, io:000001F5755BF030 debug1: connect to address 10.0.200.250 port 22: Connection timed out ssh: connect to host 10.0.200.250 port 22: Connection timed out PS C:\Users\davie>
SSH command with -vvv
09-16-2025 12:57 AM
Can you draw topolgy
MHM
09-15-2025 11:15 PM
When you put a switch SVI into a dedicated management VLAN behind the ASA, you need to make sure a couple of pieces line up beyond just the ACLs. The ASA can happily permit the traffic, but the switch has to know how to return it. If the default gateway on that SVI isn’t pointing back to the ASA, the SYN packets from your PC will hit the switch but the replies won’t make it back.
A few quick checks:
Confirm the switch’s VLAN 999 interface has its ip default-gateway
(if L2) or ip route
(if L3) set toward the ASA interface in that subnet.
On the ASA, verify you have an ACL line permitting SSH to 10.0.200.250 from your host before the deny.
Make sure the ASA interface connected to VLAN 999 is actually in that 10.0.200.0/24 network, or that there’s a static route on the ASA pointing to it.
Lastly, confirm SSH is enabled on the switch for that management IP (ip ssh
/ transport input ssh
under vty).
Once the return path is correct and ASA is permitting it, you should be able to establish the SSH session without needing to rely on the old 10.10.10.x address.
Best regards,
Stefan Mihajlov
Mark this post as Helpful if it helped you, and Accept as Solution if it resolved your question.
09-16-2025 12:17 AM
Hey @Stefan Mihajlov ,
VLAN 999 IP is 10.0.200.250... the default gateway is 10.0.200.1. The Port on the ASA its connected to is 10.0.200.1.
Can confirm the ACLS work... i switch IP and get refused... but when i have IP as set IP i get the "time out". PC and ASA can Ping 10.0.200.250
Yes SSH is enabled. The reason im doing this is to not have a local network L2 SSH connection and connect only over L3 and My IP to tighten SSH.
Regarding the 10.10.10.* address its just my PC's personal lab. I have a router That is acting as my IP 10.0.2.210 but its doing nat in and nat out. I can SSH into another IP on a different switch. Im just struggling with this one for some reason.
Looking at 12.2(55)SE12 SSH bugs now for SSH as its network SSH only that seems to be the issue...
also used wireshark to see some RST packets being returned... by the switch. Unsure why honestly at this stage
Cheers, Chris
09-16-2025 02:46 AM
Why not to restrict the SSH accesses on the switch via an access list and apply it to the VTY lines? maybe you already have one that is not allowing SSH from your PC? If you do "ping tcp 10.0.200.250 22 source 10.0.200.1 1234" from the ASA what do you get? if that command doesn't work do "ping tcp" and hit enter and fill in the required information please.
09-16-2025 12:24 PM
given you can ping 10.0.200.250 and you’re seeing RST from the switch, this is almost always a control-plane policy on the switch itself (VTY ACL / quiet-mode) or an SSH algorithm mismatch—your client debug shows it offering only diffie-hellman-group1-sha1
, which many IOS/Cat9k images refuse. From the switch, make sure the VTYs allow your routed source (not the old L2 subnet) with an access-class
that includes your 10.0.2.210-NATed IP, confirm transport input ssh
and ip ssh version 2
are set, and check you’re not in login quiet-mode
(show login
). If it’s crypto, either use a client that offers group14/sha256 or on the switch enable a compatible set, e.g. ip ssh server algorithm kex diffie-hellman-group14-sha1
(or add sha256) and keep RSA hostkeys. Quick triage: from the ASA run ping tcp 10.0.200.250 22 source 10.0.200.1 1234
to prove L4 reachability, then on the switch debug ip ssh
while you attempt the connection—you’ll immediately see whether it’s an ACL/quiet-mode drop or a KEX rejection. Once the VTY ACL matches your routed IP and the KEX lines up, the RSTs stop and SSH lands on VLAN 999 as intended.
Best regards,
Stefan Mihajlov
Mark this post as Helpful if it helped you, and Accept as Solution if it resolved your question.
09-17-2025 05:35 PM
I have gone over my VTY lines
!
line con 0
line vty 0 4
login local
transport input ssh
line vty 5 15
login local
transport input ssh
!
and algorithms.. I cant connect on the layer2 just fine with the ssh config like HostName 10.0.2.250
User admin
HostKeyAlgorithms +ssh-rsa
KexAlgorithms +diffie-hellman-group1-sha1
Ciphers +aes128-cbc
MACs +hmac-sha1
For example and regarding logins..
# show login
No login delay has been applied.
No Quiet-Mode access list has been configured.
Router NOT enabled to watch for login Attacks
#
Result of the command: "ping tcp 10.0.200.250 22 source 10.0.200.1 1234"
Type escape sequence to abort.
Sending 5 TCP SYN requests to 10.0.200.250 port 22
from 10.0.200.1 starting port 1234, timeout is 2 seconds:
?????
Success rate is 0 percent (0/5)
SO this would imply an ACL issue?
From my current network I can access the other switch on 10.0.3.* with this ruling. The hits on deny are from when ive tried on wifi for the 10.0.3 network as im not a set IP at 10.0.2.210 that way.
09-17-2025 11:21 PM
Without topolgy I can not help you
MHM
09-17-2025 11:44 PM
Hi MHM,
Internet>ASA(Each Gig port connects to a vlan on a switch) So basically Gig0/2 and Gig0/4 Into Switch im having issues with.
Gig 0/6, 0/7 and Gig0/3 into the other switch which i can SSH into.
THe switch im having issues with is a 3750 48POE
09-18-2025 10:30 PM
The SW interface with issue have same secuirty level with any other interface??
MHM
09-18-2025 11:47 PM
09-19-2025 12:02 AM
do you use same-secuity permit inter/intra?
MHM
09-18-2025 04:04 AM
The traffic from the ASA to the switch on port 22/tcp doesn't seem to go through. Do you have any ACL applied to the switch port connected to the ASA by any chance? Could you please assign your laptop an IP in the subnet 10.0.200.x and connect it to a switch port in VLAN 999 and try to SSH from there?
09-18-2025 04:30 PM
No ACLS applied on the switch. I can connect physically and get an address via DHCP on a port on vlan 999 and SSH fine with User admin
HostKeyAlgorithms +ssh-rsa
KexAlgorithms +diffie-hellman-group1-sha1
Ciphers +aes128-cbc
MACs +hmac-sha1
So SSH is working on that port it just seems to be over the network.
I have noticed TCP domain has been enabled on the other interfaces which work. Would TCP and IP need to be enabled I assume?
Enabled it and packet tracer does this...
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide