<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring outbound traffic on SSH to specific IP addresses in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4113897#M1071745</link>
    <description>&lt;P&gt;Don't use the ACL Manager section - that's mostly for ACLs used for things other than interfaces (VPNs, service policies etc.)&lt;/P&gt;
&lt;P&gt;Use the Configuration &amp;gt; Firewall &amp;gt; Access Rules section. Also not that once you put an outbound ACL in place all other traffic will be implicitly denied. If that's your intention, fine. Otherwise you may need to add some entries permitting other traffic outbound.&lt;/P&gt;
&lt;P&gt;For instance, a simple rule set would be:&lt;/P&gt;
&lt;P&gt;1. permit the desired ssh&lt;/P&gt;
&lt;P&gt;2. deny all other ssh&lt;/P&gt;
&lt;P&gt;3. permit any other traffic you want to allow&lt;/P&gt;</description>
    <pubDate>Mon, 06 Jul 2020 12:23:53 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2020-07-06T12:23:53Z</dc:date>
    <item>
      <title>Configuring outbound traffic on SSH to specific IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4113882#M1071741</link>
      <description>&lt;P&gt;Hi, very new to this and unfortunately in a position where I need to try and get some config working without having learned all the basics and core concepts yet. I'm using the ASDM for configuration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I am trying to achieve - An internal IP address able to talk to 4 external public IP addresses over SSH. The traffic only needs to be outbound and on port 22.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At first,&amp;nbsp;I created a network object for the internal IP address and I created network objects for each of the external IP addresses. I then created a rule in ACL manager as so:&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Source: server-appliance (my local IP that needs to communicate outbound on SSH/22)&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Destination: external servers&amp;nbsp;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Service: TCP/SSH&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Action: Permit&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/78394i76084DF7CC8F916D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;I didn't get anything working from this and saw that I need a NAT rule in place. So I created a NAT rule from inside to outside using my internal network object and external destinations. After this I still had no results, I'm not sure if this NAT rule is correct.&amp;nbsp;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/78395iE1BB632E0B07E52B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Ultimately I'm a bit confused and it's hard to know what to configure where. E.G, I created a rule in the ACL manager but not in the access rules section.&amp;nbsp;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;*Note - The firewall is already running with a config in place. This is just an extra bit of config to be added in.&amp;nbsp;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 12:07:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4113882#M1071741</guid>
      <dc:creator>RonTrello31209</dc:creator>
      <dc:date>2020-07-06T12:07:25Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring outbound traffic on SSH to specific IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4113897#M1071745</link>
      <description>&lt;P&gt;Don't use the ACL Manager section - that's mostly for ACLs used for things other than interfaces (VPNs, service policies etc.)&lt;/P&gt;
&lt;P&gt;Use the Configuration &amp;gt; Firewall &amp;gt; Access Rules section. Also not that once you put an outbound ACL in place all other traffic will be implicitly denied. If that's your intention, fine. Otherwise you may need to add some entries permitting other traffic outbound.&lt;/P&gt;
&lt;P&gt;For instance, a simple rule set would be:&lt;/P&gt;
&lt;P&gt;1. permit the desired ssh&lt;/P&gt;
&lt;P&gt;2. deny all other ssh&lt;/P&gt;
&lt;P&gt;3. permit any other traffic you want to allow&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 12:23:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4113897#M1071745</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-07-06T12:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring outbound traffic on SSH to specific IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4113912#M1071746</link>
      <description>&lt;P&gt;Thanks for your reply. When you say "Access List", do you mean the "Access Rules" right at the top? Pretty sure you do but wanted to check.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've deleted my ACL and replaced it with a rule in Access Rules on the inside interface as so:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/78396iE31614FEF7DD8F94/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You'll see this is rule #2, above this is already a rule for any -&amp;gt; any (service IP) &amp;gt; permit. (There is a global deny rule at the bottom too). Part of what I'm confused by is that this is on the inside interface and it says it's an incoming rule but I want it to be an outbound rule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks and appreciate the help.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 12:23:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4113912#M1071746</guid>
      <dc:creator>RonTrello31209</dc:creator>
      <dc:date>2020-07-06T12:23:21Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring outbound traffic on SSH to specific IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4113915#M1071747</link>
      <description>&lt;P&gt;This is a packet trace of my local IP address &amp;gt; external IP address whereby I want to allow SSH.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 802px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/78397i93C8CF9A9467677B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm still not getting any joy on the SSH to any of these servers.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 12:22:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4113915#M1071747</guid>
      <dc:creator>RonTrello31209</dc:creator>
      <dc:date>2020-07-06T12:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring outbound traffic on SSH to specific IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4113917#M1071748</link>
      <description>&lt;P&gt;We generally make the rule "incoming" so that the ASA can drop the traffic right away. So "incoming" on the inside interface is effectively outgoing on the outside interface (oversimplifying for the sake of discussion).&lt;/P&gt;
&lt;P&gt;Your NAT rule is essentially "no NAT". Is that what you want? To preserve the original source and destination addresses?&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 12:27:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4113917#M1071748</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-07-06T12:27:31Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring outbound traffic on SSH to specific IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4113926#M1071749</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No, I would assume that isn't what I want (this will be my lack of current knowledge), there is no need for the private IP to be preserved as far as I am aware. Is this no-NAT because I've left the translated packets as 'original'? So I should actually be setting the source interface to 'inside'? Initially I thought this, but when I try to apply the rule it errors and is deleted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the help again. I'm aware I'm trying to run before I can walk but I just need to get this in place and working.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 12:38:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4113926#M1071749</guid>
      <dc:creator>RonTrello31209</dc:creator>
      <dc:date>2020-07-06T12:38:39Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring outbound traffic on SSH to specific IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4113973#M1071752</link>
      <description>&lt;P&gt;This is where I am at the moment (but not working successfully):&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Access rule - I've changed source to 'any' as I don't think this really matters. So any source heading to those 4 destinations can do so over ssh.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture2.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/78401i83AB639DA07A6EDA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture2.PNG" alt="Capture2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Note - There are other rules to handle generic traffic and an implicit deny at the end.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT rule -&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture1.PNG" style="width: 950px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/78402i6E1982B1D0BFE6B2/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture1.PNG" alt="Capture1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 14:11:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4113973#M1071752</guid>
      <dc:creator>RonTrello31209</dc:creator>
      <dc:date>2020-07-06T14:11:49Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring outbound traffic on SSH to specific IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4114072#M1071755</link>
      <description>&lt;P&gt;Can you run packet-tracer from the cli and verify you are hitting the intended ACL entry and NAT rule? You've only shared snippets from the GUI and there may be other higher precedence rules that you are hitting instead of the ones you want.&lt;/P&gt;
&lt;PRE&gt;packet-tracer input inside tcp &amp;lt;your source address&amp;gt; 1025 &amp;lt;address of one of the destination ssh servers&amp;gt; 22&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 17:19:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4114072#M1071755</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-07-06T17:19:15Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring outbound traffic on SSH to specific IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4114425#M1071774</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what I can see, tracking a packet over the CLI returns what I should expect, see sanitised results below:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# packet-tracer input inside tcp 192.168.16.54 1025 EXTERNAL_IP 22&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop [EGRESS_IP] using egress ifc outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.16.54/1025 to TRANSLATED&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 4965522, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I may well have over-complicated things here by presuming I needed to add new rules to the firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We already have a ANY ANY rule on the inside interface which I now know is permitting any traffic from the inside to go out.&lt;BR /&gt;We also already have a NAT rule from inside to outside which is set to ANY ANY.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So in actual fact, am I trying to put something more in place that I actually don't need?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jul 2020 07:59:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4114425#M1071774</guid>
      <dc:creator>RonTrello31209</dc:creator>
      <dc:date>2020-07-07T07:59:09Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring outbound traffic on SSH to specific IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4114747#M1071799</link>
      <description>&lt;P&gt;As we can see from the packet-tracer cli output you aren't hitting any of the special ACL entries or NAT rule that you added. The traffic is allowed and NATted by the general rules already in place.&lt;/P&gt;
&lt;P&gt;That's why I asked for that output - to see how or even if the new rules you were looking at interact with what's already in the config.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jul 2020 17:38:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-outbound-traffic-on-ssh-to-specific-ip-addresses/m-p/4114747#M1071799</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-07-07T17:38:02Z</dc:date>
    </item>
  </channel>
</rss>

