• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 2274
  • Last Modified:

SSH and Telnet Access

I've setup a Cisco ASA 5510 as our Firewall security for our network. I had configured the asa for telnet access on the inside interface of the network, but for some abrupt reason, I am unable to establish any more sessions with it from my workstation. I've made no configuration changes to telnet on the device, I am able to ping the interface, and connect to the device using ASDM, but prefer to use command line. Any ideas what a noob like me did? As for SSH, what are the proper commands to enable SSH on an interface?

KDillon$ telnet 10.0.2.2
Trying 10.0.2.2...
telnet: connect to address 10.0.2.2: Operation timed out

0
IcueTV
Asked:
IcueTV
  • 4
  • 3
1 Solution
 
kanlueCommented:
assuming that your internal ip is 192.168.10.0/24, here is the basic telnet config you may use in asa5510:
----------
telnet 192.168.10.0 255.255.255.0 inside
telnet timeout 0
ssh 192.168.10.0 255.255.255.0 inside
ssh timeout 0
aaa authentication ssh console LOCAL
aaa authentication telnet console LOCAL
username <your username> password <yourpassword>
----------

hope it helps.

0
 
IcueTVAuthor Commented:
All of these are in place, and it's refusing connections now for some reason.
0
 
kanlueCommented:
can you post 'sh run' here?
0
Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

 
IcueTVAuthor Commented:
ASA Version 8.0(3)

!

hostname IcueTVFW

domain-name icuetv.com

enable password CXN3PTQq6r3J5cT3 encrypted

names

!

interface Ethernet0/0

 nameif outside

 security-level 0

 ip address 65.xxx.xxx.xxx 255.255.255.248

!

interface Ethernet0/1

 nameif inside

 security-level 100

 ip address 10.0.2.2 255.255.255.0

!

interface Ethernet0/2

 shutdown

 no nameif

 no security-level

 no ip address

!

interface Ethernet0/3

 shutdown

 no nameif

 no security-level

 no ip address

!

interface Management0/0

 shutdown

 nameif management

 security-level 0

 no ip address

!

passwd 2KFQnbNIdI.2KYOU encrypted

boot system disk0:/asa803-k8.bin

ftp mode passive

clock timezone EST -5

clock summer-time EDT recurring

dns server-group DefaultDNS

 domain-name icuetv.com

access-list outside extended permit tcp any host 65.196.22.202 eq 3389

access-list outside extended permit tcp any host 65.196.22.202 eq 3030

access-list outside extended permit tcp any host 65.196.22.202 eq 5222

access-list outside extended permit tcp any host 65.196.22.202 eq 3000

access-list outside extended permit tcp any host 65.196.22.202 eq 800

access-list outside extended permit tcp any host 65.196.22.202 eq ftp

access-list outside extended permit tcp any host 65.196.22.202 eq ssh

access-list outside extended permit tcp any host 65.196.22.202 eq 9090

access-list outside extended permit tcp any host 65.196.22.202 eq 8443

access-list outside extended permit tcp any host 65.196.22.202 eq 8080

access-list outside extended permit tcp any host 65.196.22.202 eq smtp

access-list outside extended permit tcp any host 65.196.22.202 eq pop3

access-list outside extended permit tcp any host 65.196.22.202 eq imap4

access-list outside extended permit tcp any host 65.196.22.202 eq https

access-list outside extended permit tcp any host 65.196.22.202 eq 1677

access-list outside extended permit tcp any host 65.196.22.202 eq 22201

access-list outside extended permit tcp any host 65.196.22.202 eq 22200

access-list outside extended permit tcp any host 65.196.22.202 eq 5900

access-list outside extended permit udp any host 65.196.22.202 eq 800

access-list outside extended permit udp any host 65.196.22.202 eq 5900

access-list inside_nat0_outbound extended permit ip any 10.0.2.0 255.255.255.128



pager lines 24

logging enable

logging asdm informational

mtu outside 1500

mtu inside 1500

mtu management 1500

ip local pool VPN_Pool 10.0.2.50-10.0.2.100 mask 255.255.255.0

no failover

icmp unreachable rate-limit 1 burst-size 1

icmp permit any inside

asdm image disk0:/asdm-611.bin

no asdm history enable

arp timeout 14400

global (outside) 1 interface

nat (inside) 0 access-list inside_nat0_outbound

nat (inside) 1 10.0.0.0 255.0.0.0

static (inside,inside) tcp 10.0.1.222 8443 65.196.22.202 8443 netmask 255.255.25

5.255

static (inside,inside) tcp 10.0.1.222 8080 65.196.22.202 8080 netmask 255.255.25

5.255

access-group outside in interface outside

route outside 0.0.0.0 0.0.0.0 65.196.22.201 1

route inside 10.0.1.0 255.255.255.0 10.0.2.1 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout uauth 0:05:00 absolute

dynamic-access-policy-record DfltAccessPolicy

aaa authentication enable console LOCAL

aaa authentication http console LOCAL

aaa authentication ssh console LOCAL

aaa authentication telnet console LOCAL

aaa authorization command LOCAL

http server enable

http 192.168.1.0 255.255.255.0 management

http 10.0.1.0 255.255.255.0 inside

http 10.0.2.0 255.255.255.0 inside

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart

crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac

crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac

crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac

crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac

crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac

crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac

crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac

crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs

crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128

-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256

-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5

crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP

crypto map outside_map interface outside

crypto isakmp enable outside

crypto isakmp policy 5

 authentication pre-share

 encryption 3des

 hash sha

 group 2

 lifetime 86400

crypto isakmp policy 10

 authentication pre-share

 encryption des

 hash sha

 group 2

 lifetime 86400

crypto isakmp policy 30

 authentication pre-share

 encryption aes-256

 hash sha

 group 5

 lifetime 86400

telnet 10.0.0.0 255.255.255.0 inside

telnet timeout 5

ssh 10.0.0.0 255.255.255.0 inside

ssh 0.0.0.0 0.0.0.0 inside

ssh 10.0.1.0 255.255.255.0 inside

ssh timeout 5

console timeout 0

management-access inside

threat-detection basic-threat

threat-detection scanning-threat shun

threat-detection statistics

ntp server 10.0.2.2

group-policy DfltGrpPolicy attributes

 vpn-tunnel-protocol webvpn

group-policy IcueTVTunnel internal

group-policy IcueTVTunnel attributes

 dns-server value 4.2.2.1 4.2.2.2

 vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn

 default-domain value icueTV.com

username administrator password 7TLPNITT4n1yUxsx encrypted privilege 15

username administrator attributes

 memberof administrators

username rthompson password JJktGBmsvPEebls6 encrypted privilege 15

username rthompson attributes

 service-type nas-prompt

username kdillon password Ktz9P4uOEcFAU3oZ encrypted privilege 15

username kdillon attributes

 vpn-group-policy IcueTVTunnel

tunnel-group IcueTVTunnel type remote-access

tunnel-group IcueTVTunnel general-attributes

 address-pool VPN_Pool

 authentication-server-group (outside) LOCAL

authorization-server-group (outside) LOCAL

 default-group-policy IcueTVTunnel

tunnel-group IcueTVTunnel ipsec-attributes

 pre-shared-key *

!

class-map inspection_default

 match default-inspection-traffic

!

!

policy-map type inspect dns migrated_dns_map_1

 parameters

  message-length maximum 512

policy-map global_policy

 class inspection_default

  inspect dns migrated_dns_map_1

  inspect ftp

  inspect h323 h225

  inspect h323 ras

  inspect netbios

  inspect rsh

  inspect rtsp

  inspect skinny

  inspect esmtp

  inspect sqlnet

  inspect sunrpc

  inspect tftp

  inspect sip

  inspect xdmcp

!

service-policy global_policy global

prompt hostname context

Cryptochecksum:db465056a7420704b2e4154346e2f755
0
 
kanlueCommented:
please add the following three lines to try:
telnet 10.0.2.0 255.255.255.0 inside
ssh 10.0.2.0 255.255.255.0 inside
no ssh 0.0.0.0 0.0.0.0 inside

hope it helps.

0
 
IcueTVAuthor Commented:
ssh is working now, telnet is still not for some reason.
0
 
IcueTVAuthor Commented:
kanlue, I appreciate the help, I'm going to end it, it's best I don't run telnet anyway, keep things more secure by running ssh.
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

  • 4
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now