Configure SSH Access in Cisco ASA

Share This Article: Share on Facebook0Share on Google+1Tweet about this on TwitterShare on LinkedIn1Pin on Pinterest0Email this to someone

You can access Cisco ASA appliance using Command Line Interface (CLI) using either Telnet or SSH and for web-based graphical management using HTTPS (ASDM) management. Telnet uses TCP port 23 and is not secure. Secure Shell (SSH) on the other hand uses port 22 and is secure. SSH uses public key cryptography to authenticate remote user. You can configure SSH access in Cisco ASA device using the steps shown here.

Configure SSH Access in Cisco ASA

Configure SSH Access in Cisco ASA

Step 1: Configure Enable password. (Optional)

ASA(config)# enable password system@123

Step 2: Create a username with password.

ASA(config)# username bipin password cisco@123

Step 3: Configure this local username to authenticate with SSH.

ASA(config)# aaa authentication ssh console LOCAL

Step 4: Create RSA key pair.

ASA(config)# crypto key generate rsa modulus 1024
INFO: The name for the keys will be: 
Keypair generation process begin. Please wait...

Step 5: Now specify only particular hosts or network to connect to the device using SSH.

ASA(config)# ssh 192.168.1.0 255.255.255.0 trust
ASA(config)# ssh 172.16.1.0 255.255.255.0 trust

You can now access the device using SSH from 192.168.1.0 and 172.16.1.0 network.

In this way you can configure remote SSH access in Cisco ASA appliance.

The following two tabs change content below.
Bipin is a freelance Network and System Engineer with expertise on Cisco, Juniper, Microsoft, VMware, and other technologies. You can hire him on UpWork . Follow Bipin Giri on Google+. Bipin enjoys writing articles and tutorials related to Network technologies. Some of his certifications are, MCSE:Messaging, JNCIP-SEC, JNCIS-ENT, and others.