<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SFTP server access problem through ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/sftp-server-access-problem-through-asa/m-p/4281943#M1077812</link>
    <description>&lt;P&gt;Easiest way to tell if the firewall is affecting the traffic is to look at the packet captures of the INSIDE and OUTSIDE interfaces, attempt your connection to the external SFTP server, then look at the captures. If you see packets missing in either direction, then you know something is being filtered by the firewall. Easiest way to kick this off is using the ASDM packet capture wizard but you could do it via command line as well. I personally have not had issues passing SCP, SFTP, or SSH through my ASA but your mileage may vary. Please let us know what you find or if you need any further help.&lt;/P&gt;</description>
    <pubDate>Fri, 29 Jan 2021 05:34:01 GMT</pubDate>
    <dc:creator>TJ-20933766</dc:creator>
    <dc:date>2021-01-29T05:34:01Z</dc:date>
    <item>
      <title>SFTP server access problem through ASA</title>
      <link>https://community.cisco.com/t5/network-security/sftp-server-access-problem-through-asa/m-p/4281708#M1077787</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We're having a problem accessing an outside SFTP server and suspect the problem has to do with the ASA. The connection is unexpectedly dropped.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I seem to remember a while back having similar issues, but can not remember the solution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any special configuration that needs to be implemented to allow clients to access outside SFTP servers from inside the network?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2021 20:45:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sftp-server-access-problem-through-asa/m-p/4281708#M1077787</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2021-01-28T20:45:48Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP server access problem through ASA</title>
      <link>https://community.cisco.com/t5/network-security/sftp-server-access-problem-through-asa/m-p/4281804#M1077791</link>
      <description>&lt;P&gt;We would need more information, for example: is the connection dropped after a period of idle time? if yes, how long was the idle time before the connection dropped?&lt;/P&gt;
&lt;P&gt;by default the ASA will drop idle connections after 1 hour of idle time.&amp;nbsp; If this is happening to you then you can set the value to 0 which will leave the connection open indefinitely.&lt;/P&gt;
&lt;P&gt;for example:&lt;/P&gt;
&lt;P&gt;access-list sftp-timeout extended permit tcp 10.10.10.0 255.255.255.0 host 193.212.212.212 eq 22&lt;/P&gt;
&lt;P&gt;class-map sftp-timeout&lt;/P&gt;
&lt;P&gt;&amp;nbsp;match access-list sftp-timeout&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;class sftp-timeout&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;set connection timeout idle 0&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2021 23:03:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sftp-server-access-problem-through-asa/m-p/4281804#M1077791</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-01-28T23:03:55Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP server access problem through ASA</title>
      <link>https://community.cisco.com/t5/network-security/sftp-server-access-problem-through-asa/m-p/4281826#M1077792</link>
      <description>The connection fails almost immediately. I can see it connect initially then it fails with unexpected error. I seem to remember something about the ASA not being able to inspect the data traffic because the connection is over SSH, but I’ve been unable to figure out how to make it work.&lt;BR /&gt;</description>
      <pubDate>Thu, 28 Jan 2021 23:50:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sftp-server-access-problem-through-asa/m-p/4281826#M1077792</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2021-01-28T23:50:20Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP server access problem through ASA</title>
      <link>https://community.cisco.com/t5/network-security/sftp-server-access-problem-through-asa/m-p/4281943#M1077812</link>
      <description>&lt;P&gt;Easiest way to tell if the firewall is affecting the traffic is to look at the packet captures of the INSIDE and OUTSIDE interfaces, attempt your connection to the external SFTP server, then look at the captures. If you see packets missing in either direction, then you know something is being filtered by the firewall. Easiest way to kick this off is using the ASDM packet capture wizard but you could do it via command line as well. I personally have not had issues passing SCP, SFTP, or SSH through my ASA but your mileage may vary. Please let us know what you find or if you need any further help.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 05:34:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sftp-server-access-problem-through-asa/m-p/4281943#M1077812</guid>
      <dc:creator>TJ-20933766</dc:creator>
      <dc:date>2021-01-29T05:34:01Z</dc:date>
    </item>
  </channel>
</rss>

