Difference between revisions of "Configuring SSH Access on a Cisco ASA 5510 Firewall"
From NesevoWiki
Jump to navigationJump to searchLine 14: | Line 14: | ||
fw(config)# ssh version 2 | fw(config)# ssh version 2 | ||
* Allow Access from a particular network over a particular interface ("inside" is the interface name) | * Allow Access from a particular network over a particular interface ("inside" is the interface name) | ||
− | fw(config)# ssh 192.168. | + | fw(config)# ssh 192.168.0.0 255.255.255.0 inside |
* Generate a key pair | * Generate a key pair | ||
fw(config)# domain-name <your domain> | fw(config)# domain-name <your domain> |
Revision as of 15:02, 20 January 2012
- Enter configuration mode
fw> fw> enable fw# fw# config t fw(config)#
- You need to have an enable password to use ssh
fw(config)# enable password <your password>
- User name and password to connect via ssh
fw(config)# username <your username> password <your password>
- Configure Authentication Mode
fw(config)# aaa authentication ssh console LOCAL
- Specify ssh protocol version
fw(config)# ssh version 2
- Allow Access from a particular network over a particular interface ("inside" is the interface name)
fw(config)# ssh 192.168.0.0 255.255.255.0 inside
- Generate a key pair
fw(config)# domain-name <your domain> fw(config)# crypto key generate rsa modulus 1024
That's it. You can now connect