<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Forward ssh requests to internal PC in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/forward-ssh-requests-to-internal-pc/m-p/657138#M1033219</link>
    <description>&lt;P&gt;I'm trying to forward all ssh requests for my outside IP to a PC, named "alphapc",  behind my PIX 506E firewall.  Under my current configuration, all ssh requests to my outside IP timeout.  My configuration is below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Anton&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.1(4)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password [***PASSWORD***] encrypted&lt;/P&gt;&lt;P&gt;passwd [***PASSWORD***] encrypted&lt;/P&gt;&lt;P&gt;hostname [***HOST NAME***]&lt;/P&gt;&lt;P&gt;domain-name laancor.com&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol h323 1720&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.1.111 alphapc&lt;/P&gt;&lt;P&gt;name 192.168.1.109 betapc&lt;/P&gt;&lt;P&gt;access-list ping_acl permit ip any any&lt;/P&gt;&lt;P&gt;access-list OUTSIDEACL permit tcp any host 0.0.0.0 eq www&lt;/P&gt;&lt;P&gt;pager lines 20&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside [***OUTSIDE IP ADDRESS***] 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location alphapc 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location betapc 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 72&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.1.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 22 alphapc 22 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 [***GATEWAY***] 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si&lt;/P&gt;&lt;P&gt;p 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.100-192.168.1.149 inside&lt;/P&gt;&lt;P&gt;dhcpd dns [***PRIMARY DNS***] [***SECONDARY DNS***]&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd domain [***DOMAIN NAME***]&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 09:04:48 GMT</pubDate>
    <dc:creator>laancorporation1</dc:creator>
    <dc:date>2019-03-11T09:04:48Z</dc:date>
    <item>
      <title>Forward ssh requests to internal PC</title>
      <link>https://community.cisco.com/t5/network-security/forward-ssh-requests-to-internal-pc/m-p/657138#M1033219</link>
      <description>&lt;P&gt;I'm trying to forward all ssh requests for my outside IP to a PC, named "alphapc",  behind my PIX 506E firewall.  Under my current configuration, all ssh requests to my outside IP timeout.  My configuration is below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Anton&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.1(4)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password [***PASSWORD***] encrypted&lt;/P&gt;&lt;P&gt;passwd [***PASSWORD***] encrypted&lt;/P&gt;&lt;P&gt;hostname [***HOST NAME***]&lt;/P&gt;&lt;P&gt;domain-name laancor.com&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol h323 1720&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.1.111 alphapc&lt;/P&gt;&lt;P&gt;name 192.168.1.109 betapc&lt;/P&gt;&lt;P&gt;access-list ping_acl permit ip any any&lt;/P&gt;&lt;P&gt;access-list OUTSIDEACL permit tcp any host 0.0.0.0 eq www&lt;/P&gt;&lt;P&gt;pager lines 20&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside [***OUTSIDE IP ADDRESS***] 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location alphapc 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location betapc 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 72&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.1.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 22 alphapc 22 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 [***GATEWAY***] 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si&lt;/P&gt;&lt;P&gt;p 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.100-192.168.1.149 inside&lt;/P&gt;&lt;P&gt;dhcpd dns [***PRIMARY DNS***] [***SECONDARY DNS***]&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd domain [***DOMAIN NAME***]&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:04:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-ssh-requests-to-internal-pc/m-p/657138#M1033219</guid>
      <dc:creator>laancorporation1</dc:creator>
      <dc:date>2019-03-11T09:04:48Z</dc:date>
    </item>
    <item>
      <title>Re: Forward ssh requests to internal PC</title>
      <link>https://community.cisco.com/t5/network-security/forward-ssh-requests-to-internal-pc/m-p/657139#M1033220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is not allowed through your OUTSIDEACL which is also not applied to an interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group OUTSIDEACL in interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Dec 2006 21:24:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-ssh-requests-to-internal-pc/m-p/657139#M1033220</guid>
      <dc:creator>t-heeter</dc:creator>
      <dc:date>2006-12-05T21:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: Forward ssh requests to internal PC</title>
      <link>https://community.cisco.com/t5/network-security/forward-ssh-requests-to-internal-pc/m-p/657140#M1033221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to define an access-list to allow SSH to the translated IP Address and apply the access-group inbound on the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDEACL permit tcp any host x.x.x.x eq 22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group OUTSIDEACL in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Arul &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;** Please rate all helpful posts **&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Dec 2006 22:01:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-ssh-requests-to-internal-pc/m-p/657140#M1033221</guid>
      <dc:creator>ajagadee</dc:creator>
      <dc:date>2006-12-05T22:01:00Z</dc:date>
    </item>
    <item>
      <title>Re: Forward ssh requests to internal PC</title>
      <link>https://community.cisco.com/t5/network-security/forward-ssh-requests-to-internal-pc/m-p/657141#M1033222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi .. I don't think you can use the PIX's interface to redirect ssh to another hosts.  You could however try by disabling ssh to the outside interface  no  ssh 0.0.0.0 0.0.0.0 outside and the modifying the static so tat is has the piblic ip address of your PIX instead of the 'interface' keyword ..&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp &lt;PUBLIC ip="" of="" your="" pix=""&gt; 22 alphapc 22 netmask 255.255.255.255&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;allow access for ssh to the Public IP of your PIX on the access-list applied to the outside interface  ..i.e&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Outside_IN  extended permit tcp any host &lt;PUBLIC ip="" address="" of="" the="" pix=""&gt; eq 22&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group Outside_IN in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NOTE: after modifying teh static you will need to type clear xlate for the change to take place right away however any established connections at that moment will be be forced to reconnect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps  ..  please rate if it does !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Dec 2006 22:43:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-ssh-requests-to-internal-pc/m-p/657141#M1033222</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2006-12-05T22:43:47Z</dc:date>
    </item>
  </channel>
</rss>

