Solved

vty lines on asa

Posted on 2014-12-09
7
124 Views
Last Modified: 2015-01-11
I am able to successfully login via ssh to the inside interface of the asa but when using the outside interface, i get the password incorrect. How can I change it to the same password?
0
Comment
Question by:Shark Attack
  • 4
  • 2
7 Comments
 
LVL 57

Expert Comment

by:Pete Long
ID: 40489791
The password would be the same? You would need to allow the IP or subnet you are connecting from outside with first?
0
 
LVL 1

Author Comment

by:Shark Attack
ID: 40489814
well, the issue is, I just want to make sure I can login from the outside as well, I am getting a connection but when it asks for username and password, it rejects it. When I ssh to the inside interface the un and pw works
0
 
LVL 28

Expert Comment

by:Jan Springer
ID: 40489921
The syntax is:

config t
ssh OUTSIDE_IP outside
end
wr mem
0
How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

 
LVL 1

Author Comment

by:Shark Attack
ID: 40490029
i can ssh to the outside just fine. The username and password don't work for the ourside.
But, the username and password works for the inside interface though when i ssh to it
0
 
LVL 28

Expert Comment

by:Jan Springer
ID: 40490036
what do the logs indicate?  did you configure it in ASDM or via CLI?

have you run a packet-tracer?

  packet-tracer input outside tcp host X.X.X.X 65535 outside_ip eq 22 detailed
0
 
LVL 1

Accepted Solution

by:
Shark Attack earned 0 total points
ID: 40490051
never mind. It works now. I dont know what happened but it's all good . thanks,
0
 
LVL 1

Author Closing Comment

by:Shark Attack
ID: 40542851
never mind. It works now. I dont know what happened but it's all good . thanks,
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now