We have IPSEC access to the ASA. The users authenticate using username and password. HTTPS has also been enabled on the ASA. We would like to limit remote management access to the ASA.
1)Are the following configurations accurate?
hostname(config)#ssh 192.x.x.202 255.255.255.0 inside
hostname(config)#ssh 207.x.x.204 255.255.255.240 outside
hostname(config)#http 192.x.x.202 255.255.255.0 inside
hostname(config)#http 207.x.x.202 255.255.255.240 outside
2.Is the enable password the only key feature that keeps remote access users from the management console(s) of the ASA?
I believe that there may be some syntax issues in what you are suggesting. If you do enter the command:no ssh 0.0.0.0 0.0.0.0 outside what it would do would be to look for the command:ssh 0.0.0.0 0.0.0.0 outside and if it found the command it would remove the command.
What you are trying to accomplish is to prevent SSH access through the outside interface. To do that just be sure that there is no SSH command that uses the outside parameter. I do not believe that there is any single command that says do not allow any SSH access through the outside interface.
Whether you have enabled SSH on the outside interface or not has no impact on VPN users access to network resources (other than the ASA).