Enabling SSH to your Cisco ASA Firewall
Its important to mention this will work on either inside or outside interfaces, but you should preferably only have this available to the inside, unless you're able to identify a very small number of IPs that are permitted externally. Check here to see Known SSH Vulnerabilities. Step 1 Creating an enable password DBTN-ASA(config)# enable password Password1 DBTN-ASA(config)# username dbtn password Password1 privilege 15 Step 2 Defining which IPs are permitted DBTN-ASA(config)# ssh 10.10.83.0 255.255.255.0 inside Step 3 Define a domain-name DBTN-ASA(config)# domain-name dontblamethenetwork.com Step 4 Generate your rsa key DBTN-ASA(config)# crypto key generate rsa modulus 2048 Step 5 Tie your authentication method to local logins LOCAL is a predefined keyword to look at device level logins DBTN-ASA(config)# aaa authentication ssh console LOCAL Thats it! SSH in and you're in business! All