<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks Vibhor, I read the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675548#M192106</link>
    <description>&lt;P&gt;Thanks Vibhor, I read the article and run&lt;/P&gt;&lt;P&gt;https://XXX.XXX.XXX.XXX/capture/in-cap/pcap/inside.pcap&lt;/P&gt;&lt;P&gt;https://XXX.XXX.XXX.XXX/capture/out-cap/pcap/outside.pcap&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and both come back with 404 errors when run from a pc that has got ASDM access?&lt;/P&gt;</description>
    <pubDate>Thu, 30 Apr 2015 08:53:40 GMT</pubDate>
    <dc:creator>sevenseas1</dc:creator>
    <dc:date>2015-04-30T08:53:40Z</dc:date>
    <item>
      <title>Allowing SSH traffic on port 4022 through ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675542#M192099</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to allow access to a Linux box on port 4022 via my Cisco FW 5510 via the internet (outside access). Packet tracer says that the packet will be allowed. But when I putty into the ip address for this Linux box on port 4022 the ACL doesn't get any hits and the connection times out. But when I run the packet tracer the hits do increase. This is what I have added:&lt;/P&gt;&lt;P&gt;object network STEVE_TEST&lt;BR /&gt;host internal ip address&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 4022 4022&lt;/P&gt;&lt;P&gt;access-list STEVE_TEST extended permit tcp public ip address&amp;nbsp;where host internal ip address&amp;nbsp;eq 4022&lt;/P&gt;&lt;P&gt;access-group STEVE_TEST in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is missing?????All help appreciated&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:51:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675542#M192099</guid>
      <dc:creator>sevenseas1</dc:creator>
      <dc:date>2019-03-12T05:51:56Z</dc:date>
    </item>
    <item>
      <title>Hi,As you checked the packet</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675543#M192101</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;As you checked the packet trace and if it shows allow , that would mean that the policies are correct and the relevant configuration does look correct.&lt;/P&gt;&lt;P&gt;I think the next step would be to apply captures on the ASA device interfaces:-&lt;/P&gt;&lt;P&gt;Captures on the Outside interface:-&lt;/P&gt;&lt;P&gt;capture capout interface outside match tcp host &amp;lt;IP of host from which you are testing&amp;gt; host &amp;lt;IP of ASA outside interface which is used for NAT&amp;gt;&lt;/P&gt;&lt;P&gt;Captures on the Inside interface:-&lt;/P&gt;&lt;P&gt;capture capout interface inside match tcp host &amp;lt;IP of host from which you are testing&amp;gt; host &amp;lt;IP address of the Linux Server(Private IP)&amp;gt;&lt;/P&gt;&lt;P&gt;Check if the traffic is making it to the Internal server ?&lt;/P&gt;&lt;P&gt;Also , to verify post the tracer output.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2015 14:56:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675543#M192101</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-04-29T14:56:14Z</dc:date>
    </item>
    <item>
      <title>Hi VibhorThanks for the quick</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675544#M192102</link>
      <description>&lt;P&gt;Hi Vibhor&lt;/P&gt;&lt;P&gt;Thanks for the quick response. Attached is a screenshot of the packet trace results. The packets are now being captured as per your post, how do I see what is in this capture. where and how please?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 08:21:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675544#M192102</guid>
      <dc:creator>sevenseas1</dc:creator>
      <dc:date>2015-04-30T08:21:04Z</dc:date>
    </item>
    <item>
      <title>Hi,In the captures , you need</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675545#M192103</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;In the captures , you need to check the ingress captures first and see that the packet is coming in and on the egress captures the packet should go out as well.&lt;/P&gt;&lt;P&gt;As you have TCP flow , you need to start with SYN packet and continue the flow. If you see a packet on one capture and not on the other , that might show the issue with the ASA device.&lt;/P&gt;&lt;P&gt;You can also post the captures if you are okay with that.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 08:25:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675545#M192103</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-04-30T08:25:06Z</dc:date>
    </item>
    <item>
      <title>How do I see\export these</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675546#M192104</link>
      <description>&lt;P&gt;How do I see\export these captures to post them?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 08:27:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675546#M192104</guid>
      <dc:creator>sevenseas1</dc:creator>
      <dc:date>2015-04-30T08:27:18Z</dc:date>
    </item>
    <item>
      <title>Hi,I think this would help</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675547#M192105</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I think this would help.&lt;/P&gt;&lt;P&gt;https://supportforums.cisco.com/document/6971/packet-capture-asapix-fwsm&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 08:28:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675547#M192105</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-04-30T08:28:24Z</dc:date>
    </item>
    <item>
      <title>Thanks Vibhor, I read the</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675548#M192106</link>
      <description>&lt;P&gt;Thanks Vibhor, I read the article and run&lt;/P&gt;&lt;P&gt;https://XXX.XXX.XXX.XXX/capture/in-cap/pcap/inside.pcap&lt;/P&gt;&lt;P&gt;https://XXX.XXX.XXX.XXX/capture/out-cap/pcap/outside.pcap&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and both come back with 404 errors when run from a pc that has got ASDM access?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 08:53:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675548#M192106</guid>
      <dc:creator>sevenseas1</dc:creator>
      <dc:date>2015-04-30T08:53:40Z</dc:date>
    </item>
    <item>
      <title>but i run sh capture and</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675549#M192107</link>
      <description>&lt;P&gt;but i run sh capture and attached is my screenshot it shows 0???&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 09:11:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675549#M192107</guid>
      <dc:creator>sevenseas1</dc:creator>
      <dc:date>2015-04-30T09:11:15Z</dc:date>
    </item>
    <item>
      <title>Hi,Have you verified the IP</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675550#M192108</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Have you verified the IP address of the source and destination ?&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 10:12:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675550#M192108</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-04-30T10:12:42Z</dc:date>
    </item>
    <item>
      <title>Would you care to explain</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675551#M192109</link>
      <description>&lt;P&gt;Would you care to explain&amp;nbsp;more? The packet tracer screen shot shows that the packet should be allowed? and yet I can't make a connection to the inside Linux box from an public ip address on the internet?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 10:21:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675551#M192109</guid>
      <dc:creator>sevenseas1</dc:creator>
      <dc:date>2015-04-30T10:21:26Z</dc:date>
    </item>
    <item>
      <title>Hi,Okay , this is the</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675552#M192110</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Okay , this is the possible issue.&lt;/P&gt;&lt;P&gt;Packet Tracer is only a Virtual packet classification tool which checks all configured policies configured on the ASA device.&lt;/P&gt;&lt;P&gt;Now , captures would capture the actual traffic.and show you whether this packet is actually making it out to the destination or being dropped by the ASA device or reply is being received or not .&lt;/P&gt;&lt;P&gt;I would request that we should focus on getting the captures as that would verify the issue.&lt;/P&gt;&lt;P&gt;If it is okay , you can send me the ip address and captures syntax that you have used on my email for privacy&lt;/P&gt;&lt;P&gt;vamrodia@cisco.com&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 11:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ssh-traffic-on-port-4022-through-asa-5510/m-p/2675552#M192110</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-04-30T11:18:07Z</dc:date>
    </item>
  </channel>
</rss>

