<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH Configuration , Outside Interface, Cisco Firepower 1100 Series in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768697#M1097487</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;Thanks again, for testing purposes, I will do this "&lt;SPAN&gt;&lt;STRONG&gt;ssh 0 0 Outside&lt;/STRONG&gt;".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So I need to modify the following:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ssh 8x.yy.zz.173 255.255.255.&lt;U&gt;240&lt;/U&gt; Outside &amp;gt;&amp;gt;&amp;nbsp;&lt;STRONG&gt;ssh 0 0 Outside &amp;lt;&amp;lt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Will get back with results. Have a nice weekend!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 04 Feb 2023 18:59:41 GMT</pubDate>
    <dc:creator>amh4y0001</dc:creator>
    <dc:date>2023-02-04T18:59:41Z</dc:date>
    <item>
      <title>SSH Configuration , Outside Interface, Cisco Firepower 1100 Series</title>
      <link>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768102#M1097459</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I have a Cisco Firepower 100 Series (1120).&lt;/P&gt;&lt;P&gt;System image file is "disk0:/installables/switch/fxos-k8-fp1k-lfbff.2.8.1.105.SPA"&lt;/P&gt;&lt;P&gt;Hardware: FPR-1120, 13875 MB RAM, CPU Atom C3000 series 2000 MHz, 1 CPU (12 cores)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="amh4y0001_1-1675429930685.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/175687i3CE8351E5AD6C5F9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="amh4y0001_1-1675429930685.png" alt="amh4y0001_1-1675429930685.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I am trying to enable the SSH and has configured the WAN /Outside Interface and default route as well (route outside 0 0 xx.yy.zz).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Problem: Now when I finished with SSH configuration, I can't SSH to the device, even not being asked for user /Password authentication. And one thing I noticed is that WAN address is modified and same as WAN/Outside interface which I configured statically.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;And when I try to edit it, I cannot as it show message of incorrect IP Address, see below:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="amh4y0001_0-1675429862783.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/175686i9365363B9CCA78B2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="amh4y0001_0-1675429862783.png" alt="amh4y0001_0-1675429862783.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;My WAN IP address ends in 173 while under SSH it's changed to 160.&lt;/P&gt;&lt;P&gt;Note: The IP Address is verified, was working fine with a different device in past.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Config t&lt;BR /&gt;crypto key generate rsa modulus 2048&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh 8x.yy.zz.173 255.255.255.240 Outside&lt;BR /&gt;ssh timeout 30&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;route outside 0 0 8x.yy.zz.161&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 13:20:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768102#M1097459</guid>
      <dc:creator>amh4y0001</dc:creator>
      <dc:date>2023-02-03T13:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Configuration , Outside Interface, Cisco Firepower 1100 Series</title>
      <link>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768159#M1097462</link>
      <description>&lt;P&gt;Not sure why you see those IP addresses changed on the ASDM, does it do the same if you look at the config from the CLI?&lt;/P&gt;
&lt;P&gt;Also, the command "&lt;SPAN&gt;ssh 8x.yy.zz.173 255.255.255.240 Outside&lt;/SPAN&gt;" should define the source network or IP address that will be allowed to connect to the firewall via SSH. For example, if your home public IP is 1.2.3.4 and you want to allow it to SSH into the firewall, then that command should look like this:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ssh 1.2.3.4 255.255.255.255 Outside&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 14:48:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768159#M1097462</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-02-03T14:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Configuration , Outside Interface, Cisco Firepower 1100 Series</title>
      <link>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768181#M1097466</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;thanks for reply.&lt;/P&gt;&lt;P&gt;YES, same results from CLI.&lt;BR /&gt;Have following command already in the configuration.&lt;BR /&gt;&lt;SPAN&gt;ssh 8x.yy.zz.173 255.255.255.240 Outside&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 15:21:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768181#M1097466</guid>
      <dc:creator>amh4y0001</dc:creator>
      <dc:date>2023-02-03T15:21:49Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Configuration , Outside Interface, Cisco Firepower 1100 Series</title>
      <link>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768233#M1097468</link>
      <description>&lt;P&gt;You're welcome. You would need to remove that command and replace it with whatever IP addresses or subnet you want to allow to SSH into the firewall as in my previous example. If you want to allow SSH from anywhere in the world then you can replace that command with the following:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ssh 0 0 Outside&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 16:37:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768233#M1097468</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-02-03T16:37:42Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Configuration , Outside Interface, Cisco Firepower 1100 Series</title>
      <link>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768238#M1097470</link>
      <description>&lt;P&gt;x.x.x.160 255.255.255.240 is a subnet ID.&lt;/P&gt;
&lt;P&gt;x.x.x.173 is a host address. If you want to restrict access to a specific host then use as 32-bit mask (255.255.255.255).&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 16:46:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768238#M1097470</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-02-03T16:46:42Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Configuration , Outside Interface, Cisco Firepower 1100 Series</title>
      <link>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768298#M1097473</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp; Thanks for your input.&lt;/P&gt;&lt;P&gt;My ISP has provided the following details:&lt;/P&gt;&lt;P&gt;IP: XX.XX.YY.173&lt;/P&gt;&lt;P&gt;Subnet: 255.255.255.240&lt;/P&gt;&lt;P&gt;Gateway: YY.YY.YY.161&lt;/P&gt;&lt;P&gt;Note: Above information is valid and I&amp;nbsp;was able to SSH on Cisco Router 890 series ISR in past with same information.&lt;/P&gt;&lt;P&gt;what is the possible explanation of change of the IP address in firewall?&lt;/P&gt;&lt;P&gt;What should I do now? change the subnet from &lt;U&gt;255.255.255.24&lt;/U&gt;0 to &lt;STRONG&gt;255.255.255.255&lt;/STRONG&gt;?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 19:10:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768298#M1097473</guid>
      <dc:creator>amh4y0001</dc:creator>
      <dc:date>2023-02-03T19:10:00Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Configuration , Outside Interface, Cisco Firepower 1100 Series</title>
      <link>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768307#M1097475</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;thanks for followuo.&lt;/P&gt;&lt;P&gt;Let's solve this first:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ssh 8x.yy.zz.173 255.255.255.240 Outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;WAN IP : 8x.yy.zz.173&amp;nbsp;&lt;BR /&gt;Subnet: 255.255.255.240&lt;BR /&gt;Interface: Outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In case of success, I should be able to SSH to this FW with this WAN IP address 8x.yy.zz.173 &amp;lt;I don't see if something is wrong with this command&amp;gt;&lt;BR /&gt;&lt;BR /&gt;Now the original&amp;nbsp;question,&amp;nbsp; what is causing the IP address to be changed? While I have used it on Cisco Router 890 ISR.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 19:17:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768307#M1097475</guid>
      <dc:creator>amh4y0001</dc:creator>
      <dc:date>2023-02-03T19:17:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Configuration , Outside Interface, Cisco Firepower 1100 Series</title>
      <link>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768318#M1097477</link>
      <description>&lt;P&gt;No problem. Let's break it down a bit.&lt;/P&gt;
&lt;P&gt;- Your WAN Outside interface IP is &lt;SPAN&gt;8x.yy.zz.173&lt;/SPAN&gt;/28 (subnet mask 255.255.255.240)&lt;/P&gt;
&lt;P&gt;- The subnet ID of that IP is &lt;SPAN&gt;8x.yy.zz.&lt;/SPAN&gt;160/28 as pointed by&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- You want to allow SSH to the firewall via Outside interface&lt;/P&gt;
&lt;P&gt;The firewall shows the IP &lt;SPAN&gt;8x.yy.zz.&lt;/SPAN&gt;160/28 in the SSH section because you issued the command&amp;nbsp;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN&gt;ssh 8x.yy.zz.173 255.255.255.240 Outside&lt;/SPAN&gt;&lt;SPAN&gt;". The command you issued has the subnet mask 255.255.255.240, because of this the firewall converts the IP address 8x.yy.zz.173 into the subnet ID which is 8x.yy.zz.160/28. This is why! If you want to see the IP 8x.yy.zz.173 in the SSH section, then you need to remove the command&amp;nbsp;"ssh 8x.yy.zz.173 255.255.255.240 Outside" and replace it with&amp;nbsp;"ssh 8x.yy.zz.173 255.255.255.&lt;STRONG&gt;255&lt;/STRONG&gt; Outside", so you need to change the last octet in the subnet mask from 240 to 255.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;However, as I mentioned before, the command&amp;nbsp;"ssh ... Outside" is used to define the source IP addresses or subnet that are allowed to SSH to the firewall, obv they still need to authenticate before they are allowed accesses to the firewall.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So, if you change the command&amp;nbsp;"ssh 8x.yy.zz.173 255.255.255.240 Outside" to&amp;nbsp;"ssh 8x.yy.zz.173 255.255.255.255 Outside" it means that the firewall will only accept the SSH connections from the IP 8x.yy.zz.173, but this will never happen as the IP&amp;nbsp;8x.yy.zz.173 is the firewall WAN interface itself, and the SSH connections would never source from that IP.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What you would need to do to get this to work is just changing the IP&amp;nbsp;8x.yy.zz.173 in the command&amp;nbsp;"ssh 8x.yy.zz.173 255.255.255.240 Outside" to the source public IP that you will use to source the SSH traffic from.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you want to widely allow the firewall to accept the SSH connections from anywhere which is not really recommended, then you can swap the command&amp;nbsp;"ssh 8x.yy.zz.173 255.255.255.240 Outside" with "ssh 0 0 Outside". The best security practice in this case would be to define the public IP addresses that would source the SSH traffic, example:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"ssh 1.2.3.4 255.255.255.255 Outside"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"ssh 10.20.30.40 255.255.255.255 Outside"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"ssh 100.200.3.4 255.255.255.255 Outside"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;and so on.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 19:43:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768318#M1097477</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-02-03T19:43:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Configuration , Outside Interface, Cisco Firepower 1100 Series</title>
      <link>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768328#M1097479</link>
      <description>&lt;P&gt;Your firewall (Firepower 1120 running ASA image) outside interface must have the same netmask as provided by your ISP.&lt;/P&gt;
&lt;P&gt;You have mixed up the "ssh" command (which tells the firewall what addresses may ssh to it) with the interface address configuration.&lt;/P&gt;
&lt;P&gt;Once you have configured the outside address and default route, your should be able to ping the gateway (and Internet addresses) from the ASA itself.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt; already mentioned the commands to allow access to the ASA outside (public IP) address. Generally we restrict that access to only trusted source addresses/subnets.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 20:02:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768328#M1097479</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-02-03T20:02:15Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Configuration , Outside Interface, Cisco Firepower 1100 Series</title>
      <link>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768344#M1097480</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;Appreciated a well explained reply.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So I will change the command as "ssh 8x.yy.zz.173 255.255.255.&lt;/SPAN&gt;&lt;STRONG&gt;255&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;Outside" in order to get the correct WAN Address.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;WAN IP=8x.yy.zz.173 which will be dedicated to this FW. However, I will connect to this FW from another ISP /IP. As&amp;nbsp;8x.yy.zz.173 will be only used to access the FW. So in this case, source and destination will NOT be same IPs.&lt;BR /&gt;Feel free to correct if it doesn't sound "logical"?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 20:36:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768344#M1097480</guid>
      <dc:creator>amh4y0001</dc:creator>
      <dc:date>2023-02-03T20:36:55Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Configuration , Outside Interface, Cisco Firepower 1100 Series</title>
      <link>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768596#M1097484</link>
      <description>&lt;P&gt;You need to define the source IP in the command&amp;nbsp;&lt;SPAN&gt;"ssh 8x.yy.zz.173 255.255.255.255&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Outside" not the firewall WAN interface IP. I would read this command as allow SSH from x.x.x.x to the firewall Outside interface.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Feb 2023 11:03:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768596#M1097484</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-02-04T11:03:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Configuration , Outside Interface, Cisco Firepower 1100 Series</title>
      <link>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768697#M1097487</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;Thanks again, for testing purposes, I will do this "&lt;SPAN&gt;&lt;STRONG&gt;ssh 0 0 Outside&lt;/STRONG&gt;".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So I need to modify the following:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ssh 8x.yy.zz.173 255.255.255.&lt;U&gt;240&lt;/U&gt; Outside &amp;gt;&amp;gt;&amp;nbsp;&lt;STRONG&gt;ssh 0 0 Outside &amp;lt;&amp;lt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Will get back with results. Have a nice weekend!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Feb 2023 18:59:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4768697#M1097487</guid>
      <dc:creator>amh4y0001</dc:creator>
      <dc:date>2023-02-04T18:59:41Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Configuration , Outside Interface, Cisco Firepower 1100 Series</title>
      <link>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4769478#M1097509</link>
      <description>&lt;P&gt;Yeah, that's correct and you're very welcome.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 10:10:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4769478#M1097509</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-02-06T10:10:21Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Configuration , Outside Interface, Cisco Firepower 1100 Series</title>
      <link>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4769498#M1097511</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;Perfect, I can confirm that using SSH 0 0 outside worked fine, I do understand that instead of allowing everywhere, SSH should be limited to certain IP, but for the time being, SSH is working fine, thanks for highlighting source IP and FW IP.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 10:40:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4769498#M1097511</guid>
      <dc:creator>amh4y0001</dc:creator>
      <dc:date>2023-02-06T10:40:08Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Configuration , Outside Interface, Cisco Firepower 1100 Series</title>
      <link>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4769606#M1097517</link>
      <description>&lt;P&gt;You're welcome sir.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 14:05:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-configuration-outside-interface-cisco-firepower-1100-series/m-p/4769606#M1097517</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-02-06T14:05:15Z</dc:date>
    </item>
  </channel>
</rss>

