cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1000
Views
0
Helpful
1
Replies

Cisco ASA 5505 - problem with ssh, icmp on OUTSIDE interface

Karel Svarc
Level 1
Level 1

Hi all,

I have a very strange problem with OUTSIDE interface and remote ssh. Well, I have followed documentation and configure remote access for ssh like this [1.]. If I want to connect from internet to OUTSIDE interface [2.] get no response and in log I can see this message [3.]. I really do not understand why is ssh connection dropped by OUTSIDE access-list [4.]? If I understand documentation correctly there is no impact for remote mangement/access like icmp, ssh, http(s) by interface access-list. So, why?

When I try ssh connection form internal network to INSIDE interface everything works fine and I can log in to ASA. If I try allow ssh in OUTSIDE access-list still no success and a get this message [5.]? It is strange, isn't?

The same problem with icmp if I want to "ping" OUTSIDE interface from internet a get thish message in log [6.] and configuration for ICMP like this [7.].

 

Full ASA config is in attachment.

Can anybody help how to fix it and explain what is exactly wrong.Thanks.

Regards,
Karel

 

[1.]
ssh stricthostkeycheck
ssh 10.0.0.0 255.255.255.0 INSIDE
ssh 0.0.0.0 0.0.0.0 OUTSIDE
ssh timeout 60
ssh version 2
ssh key-exchange group dh-group1-sha1

ASA-FW01# show ssh
Timeout: 60 minutes
Version allowed: 2
10.0.0.0 255.255.255.0 INSIDE
0.0.0.0 0.0.0.0 OUTSIDE
 [2.]
ASA-FW01# show nameif
Interface                Name                     Security
Vlan10                   INSIDE                   100
Vlan20                   EXT-VLAN20                 0
Vlan30                   EXT-WIFI-VLAN30           10
Vlan100                  OUTSIDE                    0

ASA-FW01# show ip
System IP Addresses:
Interface                Name                   IP address      Subnet mask     Method
Vlan10                   INSIDE                 10.0.0.1        255.255.255.0   CONFIG
Vlan20                   EXT-VLAN20             10.0.1.1        255.255.255.0   CONFIG
Vlan30                   EXT-WIFI-VLAN30        10.0.2.1        255.255.255.0   CONFIG
Vlan100                  OUTSIDE                85.71.188.158   255.255.255.255 CONFIG
Current IP Addresses:
Interface                Name                   IP address      Subnet mask     Method
Vlan10                   INSIDE                 10.0.0.1        255.255.255.0   CONFIG
Vlan20                   EXT-VLAN20             10.0.1.1        255.255.255.0   CONFIG
Vlan30                   EXT-WIFI-VLAN30        10.0.2.1        255.255.255.0   CONFIG
Vlan100                  OUTSIDE                85.71.188.158   255.255.255.255 CONFIG

ASA-FW01# show interface OUTSIDE detail
Interface Vlan100 "OUTSIDE", is up, line protocol is up
  Hardware is EtherSVI, BW 100 Mbps, DLY 100 usec
        Description: >>VLAN pro pripojeni do internetu<<
        MAC address f44e.05d0.6c17, MTU 1480
        IP address 85.71.188.158, subnet mask 255.255.255.255
  Traffic Statistics for "OUTSIDE":
        90008 packets input, 10328084 bytes
        60609 packets output, 13240078 bytes
        1213 packets dropped
      1 minute input rate 15 pkts/sec,  994 bytes/sec

[3.]

Jan 13 2015 06:45:30 ASA-FW01 : %ASA-6-106100: access-list OUTSIDE denied tcp OUTSIDE/193.86.236.70(46085) -> OUTSIDE/85.71.188.158(22) hit-cnt 1 first hit [0xb74026ad, 0x0]

[4.]

access-list OUTSIDE remark =======================================================================================

access-list OUTSIDE extended permit icmp any any echo-reply

access-list OUTSIDE extended deny ip any any log

access-group OUTSIDE in interface OUTSIDE

[5.]

Jan 12 2015 23:00:46 ASA-FW01 : %ASA-2-106016: Deny IP spoof from (193.86.236.70) to 85.71.188.158 on interface OUTSIDE

[6.]

Jan 13 2015 06:51:16 ASA-FW01 : %ASA-4-400014: IDS:2004 ICMP echo request from 193.86.236.70 to 85.71.188.158 on interface OUTSIDE

[7.]

icmp unreachable rate-limit 1 burst-size 1

icmp permit 10.0.0.0 255.0.0.0 INSIDE

icmp permit 10.0.0.0 255.0.0.0 EXT-WIFI-VLAN30

icmp permit any OUTSIDE

1 Reply 1

Marvin Rhoads
Hall of Fame
Hall of Fame

You're right that the ACL should not affect otherwise allowed communications to the interface address.

Try disabling the ip audit feature on your outside interface.

no ip audit interface OUTSIDE AP_OUTSIDE_INFO
no ip audit interface OUTSIDE AP_OUTSIDE_ATTACK
Review Cisco Networking for a $25 gift card