Difference between revisions of "Configuring SSH Access on a Cisco ASA 5510 Firewall"

From NesevoWiki
Jump to navigationJump to search
 
(One intermediate revision by the same user not shown)
Line 14: Line 14:
 
  fw(config)# ssh version 2
 
  fw(config)# ssh version 2
 
* Allow Access from a particular network over a particular interface ("inside" is the interface name)
 
* Allow Access from a particular network over a particular interface ("inside" is the interface name)
  fw(config)# ssh 192.168.x.x 255.255.255.o inside
+
  fw(config)# ssh 192.168.0.0 255.255.255.0 inside
 
* Generate a key pair  
 
* Generate a key pair  
 
  fw(config)# domain-name <your domain>
 
  fw(config)# domain-name <your domain>
 
  fw(config)# crypto key generate rsa modulus 1024
 
  fw(config)# crypto key generate rsa modulus 1024
 +
* Exit configuration mode
 +
fw(config)# exit
 +
fw#
 +
fw# disable
 +
fw>
  
That's it. You can now connect
+
That's it. You can now connect to your ASA 5510 Firewall via ssh on Port 22 from Network 192.168.0.0/255.255.255.0.

Latest revision as of 15:04, 20 January 2012

  • Enter configuration mode
fw> 
fw> enable
fw#
fw# config t
fw(config)#
  • You need to have an enable password to use ssh
fw(config)# enable password <your password>
  • User name and password to connect via ssh
fw(config)# username <your username> password <your password>
  • Configure Authentication Mode
fw(config)# aaa authentication ssh console LOCAL
  • Specify ssh protocol version
fw(config)# ssh version 2
  • Allow Access from a particular network over a particular interface ("inside" is the interface name)
fw(config)# ssh 192.168.0.0 255.255.255.0 inside
  • Generate a key pair
fw(config)# domain-name <your domain>
fw(config)# crypto key generate rsa modulus 1024
  • Exit configuration mode
fw(config)# exit
fw# 
fw# disable
fw>

That's it. You can now connect to your ASA 5510 Firewall via ssh on Port 22 from Network 192.168.0.0/255.255.255.0.