<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD detecting SSH Tunneled traffic? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-detecting-ssh-tunneled-traffic/m-p/4178378#M1075460</link>
    <description>I don't think you can detect it because it's encrypted as you listed. SSH&lt;BR /&gt;Preprocessor can detect mailformation in SSH traffic but not encoded&lt;BR /&gt;traffic.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
    <pubDate>Wed, 04 Nov 2020 07:08:13 GMT</pubDate>
    <dc:creator>Mohammed al Baqari</dc:creator>
    <dc:date>2020-11-04T07:08:13Z</dc:date>
    <item>
      <title>FTD detecting SSH Tunneled traffic?</title>
      <link>https://community.cisco.com/t5/network-security/ftd-detecting-ssh-tunneled-traffic/m-p/4178241#M1075450</link>
      <description>&lt;P&gt;I know FTD can block traffic based on Application and/or port.&amp;nbsp; So, I could create one ACP rule to block TCP 22 and/or I could also create a ACP Rule for blocking SSH and OpenSSH traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question: Is there a way to block, let's say SSH when it tunnels HTTP but not when it carries native SSH traffic?&amp;nbsp; SSH is encrypted traffic, so it would mean that the firewall would need to do a MITM on the 1st connection between the SSH client and the server.&amp;nbsp; I don't think that FTD can do MITM on SSH.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for letting me know your thoughts on this.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2020 21:01:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-detecting-ssh-tunneled-traffic/m-p/4178241#M1075450</guid>
      <dc:creator>cpaquet</dc:creator>
      <dc:date>2020-11-03T21:01:25Z</dc:date>
    </item>
    <item>
      <title>Re: FTD detecting SSH Tunneled traffic?</title>
      <link>https://community.cisco.com/t5/network-security/ftd-detecting-ssh-tunneled-traffic/m-p/4178378#M1075460</link>
      <description>I don't think you can detect it because it's encrypted as you listed. SSH&lt;BR /&gt;Preprocessor can detect mailformation in SSH traffic but not encoded&lt;BR /&gt;traffic.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Wed, 04 Nov 2020 07:08:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-detecting-ssh-tunneled-traffic/m-p/4178378#M1075460</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2020-11-04T07:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: FTD detecting SSH Tunneled traffic?</title>
      <link>https://community.cisco.com/t5/network-security/ftd-detecting-ssh-tunneled-traffic/m-p/4178400#M1075465</link>
      <description>&lt;P&gt;If you are talking about blocking SSH over non-standard ports then this should be possible using IPS.&amp;nbsp; You do not need to do MITM to block tunneling over HTTP as HTTP will not encrypt the payload (over HTTPS then you would need to do MITM).&lt;/P&gt;</description>
      <pubDate>Wed, 04 Nov 2020 08:07:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-detecting-ssh-tunneled-traffic/m-p/4178400#M1075465</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-11-04T08:07:47Z</dc:date>
    </item>
  </channel>
</rss>

