Enabling SSH to your Cisco ASA Firewall

AllCiscoFirewall

Its important to mention this will work on either inside or outside interfaces, but you should preferably only have this available to the inside, unless you're able to identify a very small number of IPs that are permitted externally. Check here to see Known SSH Vulnerabilities.

Step 1
Creating an enable password
DBTN-ASA(config)# enable password Password1
DBTN-ASA(config)# username dbtn password Password1 privilege 15

Step 2
Defining which IPs are permitted
DBTN-ASA(config)# ssh 10.10.83.0 255.255.255.0 inside

Step 3
Define a domain-name
DBTN-ASA(config)# domain-name dontblamethenetwork.com

Step 4
Generate your rsa key
DBTN-ASA(config)# crypto key generate rsa modulus 2048

Step 5
Tie your authentication method to local logins
LOCAL is a predefined keyword to look at device level logins
DBTN-ASA(config)# aaa authentication ssh console LOCAL

Thats it! SSH in and you're in business!

Categories: All, Cisco, Firewall