Solved

PIX SSH

Posted on 2004-04-07
11
3,336 Views
Last Modified: 2013-11-16
I am having an issue with Cisco PIX and consistency in SSH.  I have multiple 506E remote sites and a HQ 515E PIX.  I support them from home at sometimes.  I recently added a statement to all to allow SSH access.

ssh myip mysubnet outside

The HQ and a remote work, but one remote does not let me connect.

putty log excerpts below.
-------------------------------
Event Log: Writing new session log (SSH packets mode) to file: putty.log
Event Log: Looking up host "XX.XX.XX.XX"
Event Log: Connecting to XX.XX.XX.XX port 22
Event Log: Server version: SSH-1.5-Cisco-1.25
Event Log: We believe remote version has SSH1 ignore bug
Event Log: We believe remote version needs a plain SSH1 password
Event Log: We believe remote version can't handle RSA authentication
Event Log: We claim version: SSH-1.5-PuTTY-Release-0.53b
Event Log: Using SSH protocol version 1
Incoming packet type 2 / 0x02 (SSH1_SMSG_PUBLIC_KEY)

Steve
0
Comment
Question by:smeek
  • 6
  • 4
11 Comments
 
LVL 79

Expert Comment

by:lrmoore
Comment Utility
Does that particular PIX have DES enabled?

View from "show ver"

What version OS?
0
 
LVL 8

Author Comment

by:smeek
Comment Utility
I updated it last week to newest build and added statement today.  It looks like DES is enabled.  See SH VER below.

Cisco PIX Firewall Version 6.3(3)124
Cisco PIX Device Manager Version 3.0(1)

Licensed Features:
Failover:                    Disabled
VPN-DES:                     Enabled
VPN-3DES-AES:                Enabled
Maximum Physical Interfaces: 2
Maximum Interfaces:          2
Cut-through Proxy:           Enabled
Guards:                      Enabled
URL-filtering:               Enabled
Inside Hosts:                10
Throughput:                  Unlimited
IKE peers:                   10

This PIX has a Restricted (R) license.
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 500 total points
Comment Utility
Hmmmm.....
Any log entries from the PIX side?
0
 
LVL 8

Author Comment

by:smeek
Comment Utility
I don't have logging enabled at remote properties.  Any particular level you'd recommend?

Steve
0
 
LVL 8

Author Comment

by:smeek
Comment Utility
710001: TCP access requested from 88.88.88.88/2332 to outside:24.24.24.24/ss
h
710002: TCP access permitted from 88.88.88.88/2332 to outside:24.24.24.24/ss
h
315004: Fail to establish SSH session because PIX RSA host key retrieval failed.
315011: SSH session from 0.0.0.0 on interface outside for user "" disconnected b
y SSH server, reason: "Internal error" (0x00)
305012: Teardown dynamic TCP translation from inside:10.10.10.61/4757 to outside:
24.24.24.24/21164 duration 0:00:31
302014: Teardown TCP connection 28957 for outside:66.151.115.160/8200 to inside:
10.10.10.61/4761 duration 0:00:13 bytes 210 TCP FINs
305011: Built dynamic TCP translation from inside:10.10.10.61/4763 to outside:24.
153.243.114/21170
0
What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 
LVL 8

Author Comment

by:smeek
Comment Utility
OK.  I got it.  Need to generate RSA keys for them to connect via SSH.
0
 
LVL 79

Expert Comment

by:lrmoore
Comment Utility
Thanks! Glad you're working.
Good stuff in the logs. I never leave home without..
0
 
LVL 8

Author Comment

by:smeek
Comment Utility
Do you kind of have a standard logging recommendation.

Steve
0
 
LVL 79

Expert Comment

by:lrmoore
Comment Utility
logging on
logging timestamp <-- also setup NTP to get accurate timestamps
logging buffered debugging
logging trap errors
logging history warnings
logging host inside <host IP>
logging host inside <alternate host IP>
no logging message 106011
no logging message 313001

If I need it during troubleshooting only:
logging monitor debugging


0
 
LVL 8

Author Comment

by:smeek
Comment Utility
Cool.  Thanks again for your help.
0
 
LVL 1

Expert Comment

by:ambarishsen
Comment Utility
try this command

pix(config)#ca generate rsa key 1024
pix(config)#wr mem


sud work ............
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Exchange server is not supported in any cloud-hosted platform (other than Azure with Azure Premium Storage).
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now