Once all requirements are met, issue these commands on the PIX:
hostnamedomain-name !--- Generate a key for the SSH encryption to use. ca generate rsa key 1024 !--- Allow the desired host to connect to the PIX on the interface specified. sship_address mask interface !--- Save your configuration. ca save all write memory
This is an example:
hostname mypix domain-name cisco.com ca generate rsa key 1024 ssh 10.0.0.0 255.255.255.0 inside ca save all write memory
Occasionally, when a username and password is provided in the SSH client, an SSH window appears and then disappears. In order to resolve this problem, issue the ca zeroize rsa command in order to remove any existing RSA keys on the PIX. Then, issue the ca zeroize rsa command again in order to regenerate the RSA keys.
If the PIX is configured for port forwarding with the static command, for port 22, then the configuration of the SSH to the PIX does not work.
In PIX version 7.0 and later, this is the command needed to generate RSA key:
I'm currently using an ASA 5510 with AnyConnect that is deployed in my network. I have a scenario where I need to create about 250-500 user accounts on the device, where each account has access to anywhere from 1-10 different resources (IP addresses)...
Hello,I'm using the "show connection" command to find a SIP connection issues and I noticed that the source is placed at right side and destination is at left side. Looking the ASDM, the connection log shows the "correct" way (source at left and dest...
Hello;We have a cisco asa firewall. Tha asa version is 9.1.7users connect remotely to an FTP server through anyconnect vpn connection. The problem is that we have a limited internet network bandwidth and when a user tries to download something over the vp...