05-26-2010 10:26 AM
05-26-2010 01:16 PM
What happens if you add the management-access management command to your configuration? Where is the connecting client PC located in the topology? If not connected to the management VLAN, make sure that routing is in place to keep the traffic flow symmetrical. SSH debugs should tell you more.
05-26-2010 01:50 PM
The connecting client is connecting from our office (shown as "ME" in the configuration) and the ASA is at a data center outside of the office.
A bit of background into this, we were given a second ethernet drop at the data center, with a /30 IP range that we want to use exclusively for managing the ASA remotely; we have another external IP range setup on another interface and we are currently using that for SSH access as well.
Regarding the route, I actually do not see one set for the management interface - all I see is the one set for the outside interface. If this is, in fact an issue, what what I need to set it as?
firewall1# sh run all | inc route
route Outside 0.0.0.0 0.0.0.0 X.X.X.X 1
(nothing for "management")
management-access management had already been added:
fireall1# sh run all | inc management
nameif management
management-only
access-list management_access_in extended permit ip host OFFICE any log debugging
access-list management_access_in extended permit ip ME 255.255.255.248 any
mtu management 1500
no monitor-interface management
access-group management_access_in in interface management
http ME 255.255.255.248 management
fragment size 200 management
fragment chain 24 management
fragment timeout 5 management
no fragment reassembly full management
no sysopt noproxyarp management
crypto ipsec fragmentation before-encryption management
crypto ipsec df-bit copy-df management
ssh ME 255.255.255.248 management
ssh OFFICE 255.255.255.255 management
management-access management
enable management
no password-management
no password-management
no password-management
authentication-server-group (management) LOCAL
authorization-server-group (management) LOCAL
no password-management
TIA!
05-26-2010 07:14 PM
From the posted configuration, your management 0/0 subnet is a /30, that means only 2 usable ip addresses in that subnet. Since you have assigned 1 to your management interface, you have one other ip address to use in that subnet. You would need to be directly connected to that interface to SSH to the management interface. Alternatively, you can VPN into the ASA, and SSH to the management ip address if you have the following configured:
ssh
And another thing to check is if you have split tunnel configured for your VPN client, you would need to make sure that you include the management interface subnet in the split tunnel ACL.
So rule of thumb for SSH to ASA:
1) You need to be directly connected to the interface that you are trying to manage, ie: if you try to manage the ASA by connecting to the management interface, you would need to be connected through the management interface.
OR/
2) If you are not directly connected, you would need to VPN in, and you can manage the opposite interface where the session is sourced from. In VPN scenario, you would VPN to the outside interface, and you can manage the ASA through SSH on the management interface.
Hope that helps.
05-26-2010 07:27 PM
halijenn,
Thank you for responding.
So in essence, there isn't a way to directly attach two seperate physical ethernet WAN connections to a 5510 - and being able to remotely SSH to both interfaces on both IP addresses?
If that is the case, then I have a dilemna. This second ethernet line was setup so that we would have a secondary means (a 2nd ISP on a seperate ethernet line) to manage the ASA at the data center location. Is this just not possible? Must we use the outside interface to SSH in no matter what?
Thanks in advance!
05-27-2010 04:40 AM
Not too sure how you are going to connect the 2nd ISP line to your ASA because you can not have 2 default gateway configured on the ASA on 2 different interfaces. Unless you only route specific traffic towards the 2nd ISP, you wouldn't even be able to have both ISP routing at the same time on 2 ASA interfaces using default gateway.
From your description, it seems like you would like to manage the ASA from both connections, hence I assume that you are under the impression that ASA can have 2 default gateways through 2 different interfaces which is not a supported config. Please let me know if it's otherwise.
To answer your question, you can only SSH to a different interface then the interface you are connecting to if you VPN to the ASA. Otherwise, if the session is coming inbound from outside interface, you can only SSH to the outside interface, not any other interfaces.
05-27-2010 11:19 AM
That's quite disappointing , but thank you for enlightening me.
Ok, back to the drawing board. The goal is to have a secondary connection for access to our production ASA. Can you tell me if there is a possiblity in this situation:
We also have a 2nd ASA 5510 sitting on the rack right next to the other one! (it's not currently being used); we also have a 3560 switch with about 13 free ports.
The 1st ASA has these two free interfaces: M0/0 and E0/3.
Would there be a way to do some network wizardy make this work, to overcome the issue of not being able to have >1 deault routes on the production ASA?
TIA
05-27-2010 06:32 PM
halijenn wrote:
Not too sure how you are going to connect the 2nd ISP line to your ASA because you can not have 2 default gateway configured on the ASA on 2 different interfaces. Unless you only route specific traffic towards the 2nd ISP, you wouldn't even be able to have both ISP routing at the same time on 2 ASA interfaces using default gateway.
From your description, it seems like you would like to manage the ASA from both connections, hence I assume that you are under the impression that ASA can have 2 default gateways through 2 different interfaces which is not a supported config. Please let me know if it's otherwise.To answer your question, you can only SSH to a different interface then the interface you are connecting to if you VPN to the ASA. Otherwise, if the session is coming inbound from outside interface, you can only SSH to the outside interface, not any other interfaces.
Ha, I solved ths by adding this route:
route management
The only drawback to this is, any machines behind the ASA cannot route traffic to the
Cheers
05-28-2010 02:59 AM
Perfect, thanks for the update.
07-06-2010 07:40 AM
You can use the dual ISPs by using IP SLA to check the primary and when/if it fails, switch to the backup.
This example uses 2 outside interfaces called "outside" and "outside2"
sla monitor 10
type echo protocol ipIcmpEcho
num-packets 3
frequency 15
sla monitor schedule 10 life forever start-time now
track 1 rtr 10 reachability
route outside 0.0.0.0 0.0.0.0
route outside2 0.0.0.0 0.0.0.0
If you need an extra interface, you can convert the management port to a useable interface like this:
interface management0/0
no management-only
Cisco does not recomment this however.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide