cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1118
Views
20
Helpful
8
Replies

Unable to SSH/TELNET/HTTPS to Management interface from outside network

shaikk.mydeen
Level 1
Level 1

I have a ASA 5585 with single slot (No IPS), Simple network, ASA Outside interface connected to Internet /Wan and Inside interface to LAN , ASA Management 0/0 is connected to LAN Access switch Management VLAN. 

 

I have allowed any any policy for management interface. 

 

Able to access the Inside Management VLAN segment from outside network except the ASA Management. 

 

In the ASA specifically mentioned external segment IP for ssh, telnet and HTTPS access

ssh 10.51.x.x 255.255.X.X management

telnet 10.51.x.x 255.255.X.X management

https 10.51.x.x 255.255.X.X management

8 Replies 8

It looks as though you are trying to access the management interface from the 10.51.x.x network on the Internet/WAN. This will never work as the ASA does not allow traffic to an interface on the ASA that is not the ingress interface.  So to access the mgmt0/0 for administrative purposes you will either need to access it from a device on the 10.55.10.x/24 network, or that the traffic is routed via the switch and then to the mgmt0/0 interface.  To access the mgmt0/0 from the internet you would need to set up a RA VPN, add the command management-access management (replace management with the name you have given the interface).  You would also need to add the command ssh x.x.x.x y.y.y.y management to allow traffic from the VPN IP pool.

 

Keep in mind that interface access lists such as the any any you added to management interface does not affect "to the box" management traffic.  This access list only affects traffic passing through the ASA.

--
Please remember to select a correct answer and rate helpful posts

Thanks Marius,

As you stated "that the traffic is routed via the switch and then to the mgmt0/0 interface" what kind of route should be done? Since when I tried to add the default gateway for the ASA Mgmt0/0 to the L3 Management VLAN Interface of Switch, It didnt worked. 

 

Thanks

Sheik Mytheen M

Addition to it... 

 

Please find the routes

 

route outside 0.0.0.0 0.0.0.0 <default gate connected to outside interface>
route inside 10.55.0.0 255.255.0.0 10.55.1.2 (connected to inside interface)

 

as management is directly connected , route addition doesn't affect the packet flow.


My aim is with the current setup need to access the management from outside network.

Adding a route to the for management network that points to the inside interface is pointless.  A directly connected interface will always be prefered over a route, even if you set the administrative distance to 1.

 

It really depends what you are trying to access on the management interface.  If you are trying to manage the ASA via the mgmt interface from the outside network, then you must use a VPN, there really is no other way around this.  On the other hand, if you have a jumpstation server on the inside network, you could set up a NAT in the ASA that goes to this jump on port tcp/3389 and then RDP to that server and then manage the ASA from that server.

--
Please remember to select a correct answer and rate helpful posts

Dennis Mink
VIP Alumni
VIP Alumni

did you add a route management 0.0.0.0 0.0.0.0 10.51.10,x  ?so it has a way back to a non direct connected subnet?

Please remember to rate useful posts, by clicking on the stars below.

route outside 0.0.0.0 0.0.0.0 (Outside interface connected IP) is configured. Configuring the same for the management interface is not allowed, i.e

 

(conf)#route management 0.0.0.0 0.0.0.0 (Outside interface connected IP) 

Error: cannot add route entry, conflict with existing routes 

Yes this is correct.  And if you apply a more general route (ex. /16) and change the administrative distance, the connected route will still be preferred.

I have provided you with the options to connect to the ASA management interface from the outside network already.  Again, they are connect over an RA VPN (AnyConnect) or setup a jumpstation on your inside network.

--
Please remember to select a correct answer and rate helpful posts

IS this still same logic in latest OS versions?

Review Cisco Networking for a $25 gift card