I have an ASA which I am unable to log in to via SSH when I have been previously.
I SSH into the firewall and the TCP connection is created but it is instantly brought down by a TCP RST packet after the 3 way handshake is complete(per a packet capture).
I am able to successfully telnet into the firewall.
I have deleted and re-created the RSA keys without luck. The normal SSH <ip address> lines are in the config for my source network.
The following line appears in the logs and validates my packet sniff :
%ASA-6-302014: Teardown TCP connection 401094 for LAV-LAN:10.0.55.71/3672 to NP Identity Ifc:10.0.13.202/22 duration 0:00:00 bytes 0 TCP Reset-I
I have not rebooted the FW as yet as it is a 24 hour site and even a 5 min reboot is an issue as no failover etc.
I did notice that there are numerous (ie 5) ssh_init processes running when there are no SSH sessions open (per "sh ssh sessions").
Is anyone aware of a bug which may be causing this? There have been some relating to ssh but the release notes are not big on detail. This firewall is running "Cisco Adaptive Security Appliance Software Version 7.0(5)"
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :