|
#1
|
|||
|
|||
Cisco ASA Profile not working on SecureFX
Code:
i SecureFX version 9.0.2.2496 (Official Release - May 20, 2021) i Attempting to connect to 10.225.225.99 i Session window 00002 established for session AACFW01-102302-Y39 - 10.225.225.99 i SSH2Core version 9.0.2.2496 i Connecting to 10.225.225.99:22 ... i Changing state from STATE_NOT_CONNECTED to STATE_EXPECT_KEX_INIT i Using protocol SSH2 i RECV : Remote Identifier = 'SSH-2.0-Cisco-1.25' i CAP : Remote can re-key i CAP : Remote sends language in password change requests i CAP : Remote sends algorithm name in PK_OK packets i CAP : Remote sends algorithm name in public key packets i CAP : Remote sends algorithm name in signatures i CAP : Remote sends error text in open failure packets i CAP : Remote sends name in service accept packets i CAP : Remote includes port number in x11 open packets i CAP : Remote uses 160 bit keys for SHA1 MAC i CAP : Remote supports new diffie-hellman group exchange messages i CAP : Remote correctly handles unknown SFTP extensions i CAP : Remote correctly encodes OID for gssapi i CAP : Remote correctly uses connected addresses in forwarded-tcpip requests i CAP : Remote can do SFTP version 4 i CAP : Remote uses SHA1 hash in RSA signatures for x.509v3 i CAP : Remote x.509v3 uses ASN.1 encoding for DSA signatures i CAP : Remote correctly handles zlib@openssh.com i SSPI : Requesting full delegation i SSPI : [Kerberos] SPN : host@10.225.225.99 i SSPI : [Kerberos] InitializeSecurityContext() failed. i SSPI : [Kerberos] The specified target is unknown or unreachable i SSPI : [Kerberos] Disabling gss mechanism i GSS : Requesting full delegation i GSS : [Kerberos] SPN : host@10.225.225.99 i GSS : [Kerberos] InitializeSecurityContext() failed. i GSS : [Kerberos] Could not load library 'gssapi64.dll': The specified module could not be found. i GSS : [Kerberos] Disabling gss mechanism i GSS : [Kerberos] Disabling gss mechanism i The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-group1-sha1-toWM5Slw5Ew8Mqkay+al2g== i SSPI : Requesting full delegation i SSPI : [Kerberos (Group Exchange)] SPN : host@10.225.225.99 i SSPI : [Kerberos (Group Exchange)] InitializeSecurityContext() failed. i SSPI : [Kerberos (Group Exchange)] The specified target is unknown or unreachable i SSPI : [Kerberos (Group Exchange)] Disabling gss mechanism i GSS : Requesting full delegation i GSS : [Kerberos (Group Exchange)] SPN : host@10.225.225.99 i GSS : [Kerberos (Group Exchange)] InitializeSecurityContext() failed. i GSS : [Kerberos (Group Exchange)] Could not load library 'gssapi64.dll': The specified module could not be found. i GSS : [Kerberos (Group Exchange)] Disabling gss mechanism i GSS : [Kerberos (Group Exchange)] Disabling gss mechanism i The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g== i SEND : KEXINIT i SEARCH: C:\ProgramData\VanDyke\Known Hosts\ i SEARCH: C:\Users\__REDACTED__\AppData\Roaming\VanDyke\Config\KnownHosts\ i RECV : Read kexinit i Available Remote Kex Methods = diffie-hellman-group1-sha1 i Selected Kex Method = diffie-hellman-group1-sha1 i Available Remote Host Key Algos = ssh-rsa i Selected Host Key Algo = ssh-rsa i Available Remote Send Ciphers = aes128-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr i Selected Send Cipher = aes256-ctr i Available Remote Recv Ciphers = aes128-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr i Selected Recv Cipher = aes256-ctr i Available Remote Send Macs = hmac-sha1,hmac-sha1-96 i Selected Send Mac = hmac-sha1-96 i Available Remote Recv Macs = hmac-sha1,hmac-sha1-96 i Selected Recv Mac = hmac-sha1-96 i Available Remote Compressors = none i Selected Compressor = none i Available Remote Decompressors = none i Selected Decompressor = none i Changing state from STATE_EXPECT_KEX_INIT to STATE_KEY_EXCHANGE i SEND : KEXDH_INIT i RECV : KEXDH_REPLY i Changing state from STATE_KEY_EXCHANGE to STATE_READY_FOR_NEW_KEYS i RECV: Remote Hostkey (SHA-2 hash hex): 00:db:0c:e1:71:c2:45:ee:14:8a:de:e9:7a:73:12:d4:66:a4:ca:44:3c:8d:b7:43:71:51:53:93:7e:6e:bd:0c i RECV: Remote Hostkey (SHA-2 hash base64): ANsM4XHCRe4Uit7penMS1GakykQ8jbdDcVFTk35uvQw i RECV: Remote Hostkey (SHA-1 hash): de:f9:95:61:77:c9:3a:2f:3b:d9:40:0e:94:f5:e9:1f:d0:2b:e7:84 i RECV: Remote Hostkey (MD5 hash): c8:01:83:84:3e:aa:a7:c2:bd:ab:e3:45:e1:64:0c:83 i SEARCH: 0 entries found for host i SEARCH: 1 entries found for host i SEARCH: hostkey was matched in database. i SEND : NEWKEYS i Changing state from STATE_READY_FOR_NEW_KEYS to STATE_EXPECT_NEWKEYS i RECV : NEWKEYS i Changing state from STATE_EXPECT_NEWKEYS to STATE_CONNECTION i SEND: SERVICE_REQUEST[ssh-userauth] i RECV: SERVICE_ACCEPT[ssh-userauth] -- OK i SENT : USERAUTH_REQUEST [none] i Authenticating as user __REDACTED___ i RECV : SSH_MSG_USERAUTH_BANNER i This U.S government system is intended to be used by i [authorized __REDACTED__ network users] for viewing and retrieving information only, i except as otherwise explicitly authorized. __REDACTED__ information resides on and i transmits through computer systems and networks funded by __REDACTED__. All use i is considered to be with an understanding and acceptance that there is no i reasonable expectation of privacy for any data or transmissions on i Government Intranet or Extranet (non-public) networks or systems. All i transactions that occur on this system and all data transmitted through i this system are subject to review and action including (but not limited to) i monitoring, recording, retrieving, copying, auditing, inspecting, i investigating, restricting access, blocking, tracking, disclosing to i authorized personnel, or any other authorized actions by all authorized __REDACTED__ i and law enforcement personnel. All use of this system constitutes i understanding and unconditional acceptance of these terms. Unauthorized i attempts or acts to either (1) access, upload, change, or delete i information on this system, (2) modify this system, (3) deny access to this i system, or (4) accrue resources for unauthorized use on this system are i strictly prohibited. Such attempts or acts are subject to action that may i result in criminal, civil, or administrative penalties. i i RECV : USERAUTH_FAILURE, continuations [publickey,password] i SENT : USERAUTH_REQUEST [password] i RECV : AUTH_SUCCESS i SEND[0]: SSH_MSG_CHANNEL_OPEN('session') i SEND[0]: Pty Request (term: vt100, rows: 1024, cols: 256) i RECV[0]: pty request succeeded i SEND[0]: shell request i RECV[0]: shell request succeeded i RECV[0]: This U.S government system is intended to be used by i RECV[0]: [authorized __REDACTED__ network users] for viewing and retrieving information only, i RECV[0]: except as otherwise explicitly authorized. __REDACTED__ information resides on and i RECV[0]: transmits through computer systems and networks funded by __REDACTED__. All use i RECV[0]: is considered to be with an understanding and acceptance that there is no i RECV[0]: reasonable expectation of privacy for any data or transmissions on i RECV[0]: Government Intranet or Extranet (non-public) networks or systems. All i RECV[0]: transactions that occur on this system and all data transmitted through i RECV[0]: this system are subject to review and action including (but not limited to) i RECV[0]: monitoring, recording, retrieving, copying, auditing, inspecting, i RECV[0]: investigating, restricting access, blocking, tracking, disclosing to i RECV[0]: authorized personnel, or any other authorized actions by all authorized __REDACTED__ i RECV[0]: and law enforcement personnel. All use of this system constitutes i RECV[0]: understanding and unconditional acceptance of these terms. Unauthorized i RECV[0]: attempts or acts to either (1) access, upload, change, or delete i RECV[0]: information on this system, (2) modify this system, (3) deny access to this i RECV[0]: system, or (4) accrue resources for unauthorized use on this system are i RECV[0]: strictly prohibited. Such attempts or acts are subject to action that may i RECV[0]: result in criminal, civil, or administrative penalties. i RECV[0]: This U.S government system is intended to be used by i RECV[0]: [authorized __REDACTED__ network users] for viewing and retrieving information only, i RECV[0]: except as otherwise explicitly authorized. __REDACTED__ information resides on and i RECV[0]: transmits through computer systems and networks funded by __REDACTED__. All use i RECV[0]: is considered to be with an understanding and acceptance that there is no i RECV[0]: reasonable expectation of privacy for any data or transmissions on i RECV[0]: Government Intranet or Extranet (non-public) networks or systems. All i RECV[0]: transactions that occur on this system and all data transmitted through i RECV[0]: this system are subject to review and action including (but not limited to) i RECV[0]: monitoring, recording, retrieving, copying, auditing, inspecting, i RECV[0]: investigating, restricting access, blocking, tracking, disclosing to i RECV[0]: authorized personnel, or any other authorized actions by all authorized __REDACTED__ i RECV[0]: and law enforcement personnel. All use of this system constitutes i RECV[0]: understanding and unconditional acceptance of these terms. Unauthorized i RECV[0]: attempts or acts to either (1) access, upload, change, or delete i RECV[0]: information on this system, (2) modify this system, (3) deny access to this i RECV[0]: system, or (4) accrue resources for unauthorized use on this system are i RECV[0]: strictly prohibited. Such attempts or acts are subject to action that may i RECV[0]: result in criminal, civil, or administrative penalties. i RECV[0]: User __REDACTED___ logged in to AACFW01-52283-Y40 i RECV[0]: Logins over the last 43 days: 2. Last login: 15:46:56 GMT Apr 30 2021 from 10.224.189.18 i RECV[0]: Failed logins since the last login: 0. i RECV[0]: Type help or '?' for a list of available commands. i SEND[0]: terminal length 0 i RECV[0]: AACFW01-52282-Y40/admin/act/pri# terminal length 0 i RECV[0]: ^ i RECV[0]: ERROR: % Invalid input detected at '^' marker. i SEND[0]: enable i RECV[0]: AACFW01-52282-Y40/admin/act/pri# enable i RECV[0]: ^ i RECV[0]: ERROR: % Invalid input detected at '^' marker. i SEND[0]: pwd i RECV[0]: AACFW01-52282-Y40/admin/act/pri# pwd i RECV[0]: ^ i RECV[0]: ERROR: % Invalid input detected at '^' marker. i SCP command failed. i Remote operating system type is Cisco ASA. i SEND[0]: cd i RECV[0]: AACFW01-52282-Y40/admin/act/pri# cd i RECV[0]: ^ i RECV[0]: ERROR: % Invalid input detected at '^' marker. i SEND[0]: dir i RECV[0]: AACFW01-52282-Y40/admin/act/pri# dir i RECV[0]: ^ i RECV[0]: ERROR: % Invalid input detected at '^' marker. Last edited by jdev; 05-20-2021 at 10:23 AM. Reason: Remove sensitive information that should have been redacted by OP |
#2
|
|||
|
|||
Hi MARCUSR,
I just replied to your email regarding this issue. ![]() Please refer to my response to your message.
__________________
Thanks, --Brittney VanDyke Software Technical Support support@vandyke.com (505) 332-5730 |
![]() |
Thread Tools | |
Display Modes | |
|
|