Ciscoasa (config) # Crypto key generate RSA modulus 1024
Specifies the size of the RSA coefficients, the larger the value, the longer it takes to generate RSA, the Cisco recommends using 1024.
Warning:you has a RSA keypair already defined named <default-rsa-key>.
Warning: You have an RSA key pair defined by the named < default RSA key >.
Do you really want to replace them? [yes/no]: Y
Do you really want to replace them? [Yes/no]:y
Keypair generation process begin. Please wait ...
The start of the key pair generation process. Please wait ...
Ciscoasa (config) # write mem //Save the key that was just generated
Building configuration ...
Cryptochecksum:e12b5eeb 3d4365c4 797363eb 3f557697
3082 bytes copied in 1.380 secs (3082 bytes/sec)
[OK]
Ciscoasa (config) # ssh 0.0.0.0 0.0.0.0 outside //0.0.0.0 0.0.0.0 means that any external host can access the outside interface via SSH, of course you can specify a specific host or network to enter Row access, outside can also be changed to inside, which means that the firewall is accessed internally via SSH
Ciscoasa (config) # ssh timeout +//Set timeout time in minutes
Ciscoasa (config) # SSH version 1 //Specify SSH versions, you can choose version 2
Ciscoasa (config) # passwd admin //passwd Command Specifies the password for the remote access password
Related commands
show SSH //See SSH configuration information
Show Crypto key mypubkey RSA //View generated RSA key value
Crypto key Zeroize //Clears all generated keys
This article from "11342412" blog, declined reprint!
Cisco firewall 5505 SSH Login mode configuration