You can access Cisco ASA appliance using Command Line Interface (CLI) using either Telnet or SSH and for web-based graphical management using HTTPS (ASDM) management. Telnet uses TCP port 23 and is not secure. Secure Shell (SSH) on the other hand uses port 22 and is secure. SSH uses public key cryptography to authenticate remote user. You can configure SSH access in Cisco ASA device using the steps shown here.
Configure SSH Access in Cisco ASA
Step 1: Configure Enable password. (Optional)
ASA(config)# enable password system@123
Step 2: Create a username with password.
ASA(config)# username bipin password cisco@123
Step 3: Configure this local username to authenticate with SSH.
ASA(config)# aaa authentication ssh console LOCAL
Step 4: Create RSA key pair.
ASA(config)# crypto key generate rsa modulus 1024 INFO: The name for the keys will be: Keypair generation process begin. Please wait...
Step 5: Now specify only particular hosts or network to connect to the device using SSH.
ASA(config)# ssh 192.168.1.0 255.255.255.0 trust ASA(config)# ssh 172.16.1.0 255.255.255.0 trust
You can now access the device using SSH from 192.168.1.0 and 172.16.1.0 network.
In this way you can configure remote SSH access in Cisco ASA appliance.
You may also like -
Latest posts by Bipin (see all)
- Install Exchange 2019 in Windows Server 2019 - November 28, 2020
- Why Backup your Microsoft Office 365 - November 27, 2020
- What’s New in VMware vSphere 7 - September 18, 2020