


In this way you can configure remote SSH access in Cisco ASA appliance. You can now access the device using SSH from 192.168.1.0 and 172.16.1.0 network. 2) You have to configure a hostname and domain name 3) You will need to generate an RSA Key. Step 5: Now specify only particular hosts or network to connect to the device using SSH. 1) Connect to the ASA via console and get in configuration mode. ASA(config)# crypto key generate rsa modulus 1024 ASA(config)# aaa authentication ssh console LOCAL ASA(config)# username bipin password 3: Configure this local username to authenticate with SSH. (Optional) ASA(config)# enable password 2: Create a username with password. Enter the following on the NetworkAutomation host generate your ssh key ssh-keygen -b 4096 convert to PKF format ssh-keygen -e -f /path/to/key/idrsa.pub copy the output of the above command if using GNS3, enter the following to claim ownership of the /.ssh/config directory chown root /root/. You can configure SSH access in Cisco ASA device using the steps shown here. SSH uses public key cryptography to authenticate remote user. Secure Shell (SSH) on the other hand uses port 22 and is secure. Enter the following on the NetworkAutomation host generate your ssh key ssh-keygen -b 4096 convert to PKF format ssh-keygen -e -f /path/to/key/idrsa. Generate the key as an SSH-2 RSA key pair. Telnet uses TCP port 23 and is not secure. Firstly you need to generate a PuTTY key pair. You can access Cisco ASA appliance using Command Line Interface (CLI) using either Telnet or SSH and for web-based graphical management using HTTPS (ASDM) management.
