<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Mike,I have started over in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/permit-ssh-from-external-to-internal/m-p/2757123#M192829</link>
    <description>&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;I have started over again.&lt;/P&gt;&lt;P&gt;my intent is to allow access from outside to inside over ssh, as a simple test, using the firewall IP to do port forward. It appears from reading the builtin help as if I can do this purely via GUI, and without manually configuring NAT/ACL, simply by using the Firewall function "Public Servers" however this fails to work; I believe that command line work is required. While I'm not familiar with Cisco I've worked with Juniper, Sonicwall, iptables. Part of my problem is that a lot of the examples i can find on the net refer to older ASA version.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am on ASA 9.3 and I suspect the syntax differs from what you suggest, here is what I'm trying:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;a static one to one NAT as a simple test&lt;/P&gt;&lt;P&gt;ciscoasa(config)# object network vmware&lt;BR /&gt;ciscoasa(config-network-object)# host 192.168.1.6&lt;BR /&gt;ciscoasa(config-network-object)# nat (inside,outside) static 192.168.110.201&lt;BR /&gt;ERROR: Address 192.168.110.201 overlaps with outside interface address.&lt;BR /&gt;ERROR: NAT Policy is not downloaded&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;current error: tcp access denied by ACL from 192.168.110.199/41256 to outside 192.168110.201/22&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see no way using the GUI to assign another IP to the external interface.&lt;/P&gt;&lt;P&gt;ASA Version 9.3(2)2&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.110.201 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network VmwareHypervisor&lt;BR /&gt;&amp;nbsp;host 192.168.1.6&lt;BR /&gt;object network Vmware&lt;BR /&gt;&amp;nbsp;host 192.168.1.6&lt;BR /&gt;object network Public_Vmware&lt;BR /&gt;&amp;nbsp;host 192.168.110.202&lt;BR /&gt;object network public_outside&lt;BR /&gt;&amp;nbsp;host 192.168.110.201&lt;BR /&gt;object network host&lt;BR /&gt;&amp;nbsp;host 192.168.1.6&lt;BR /&gt;object service SSH&lt;BR /&gt;&amp;nbsp;service tcp source eq ssh&amp;nbsp;&lt;BR /&gt;object network vmware&lt;BR /&gt;&amp;nbsp;host 192.168.1.6&lt;BR /&gt;access-list outside_access_in extended permit tcp interface outside object VmwareHypervisor eq ssh&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp interface outside interface inside eq ssh&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit ip any any&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp interface outside interface inside eq ssh&amp;nbsp;&lt;BR /&gt;access-list ACL-OUTSIDE-IN extended permit tcp any host 192.168.1.6 eq ssh&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;! &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (any,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.110.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&amp;nbsp;&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 208.69.120.201 source outside&lt;BR /&gt;ntp server 23.226.142.216 source outside&lt;BR /&gt;ntp server 108.59.2.24 source outside&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 14 Aug 2015 21:00:00 GMT</pubDate>
    <dc:creator>styler001</dc:creator>
    <dc:date>2015-08-14T21:00:00Z</dc:date>
    <item>
      <title>permit ssh from external to internal</title>
      <link>https://community.cisco.com/t5/network-security/permit-ssh-from-external-to-internal/m-p/2757120#M192824</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Haven't used Cisco firewall in over a decade.&lt;/P&gt;&lt;P&gt;I have a shiny new Cisco ASA 5506-x. I have configured it almost exactly like this:&lt;/P&gt;&lt;P&gt;&lt;A href="http://blog.router-switch.com/2015/03/quick-guide-how-to-start-a-cisco-asa-5506-x/" target="_blank"&gt;http://blog.router-switch.com/2015/03/quick-guide-how-to-start-a-cisco-asa-5506-x/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;and&amp;nbsp;&lt;SPAN id="docs-internal-guid-7ae9081f-2851-094c-a2d5-f31f131e1de1"&gt;&lt;SPAN style="font-size: 13.3333333333333px; font-family: Arial; color: rgb(0, 0, 0); font-weight: 700; vertical-align: baseline; white-space: pre-wrap;"&gt;I used the ASDM app to add a rule under Configuration-&amp;gt;Firewall-&amp;gt;Access rules to permit inbound SSH.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN style="font-size: 13.3333333333333px; font-family: Arial; color: rgb(0, 0, 0); font-weight: 700; vertical-align: baseline; white-space: pre-wrap;"&gt;When I try to connect via SSH, the connection times out. The error I see on the Cisco is:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000" face="Arial"&gt;&lt;SPAN style="font-size: 13.3333330154419px; white-space: pre-wrap;"&gt;&lt;B&gt;denied due to nat reverse path failure&lt;/B&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000" face="Arial"&gt;&lt;SPAN style="font-size: 13.3333330154419px; white-space: pre-wrap;"&gt;&lt;B&gt;I am trying to set up a test environment and permit ssh, once I have that in place I think I can iterate and get a proper config up.&lt;/B&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000" face="Arial"&gt;&lt;SPAN style="font-size: 13.3333330154419px; white-space: pre-wrap;"&gt;&lt;B&gt;How do I permit SSH from external to internal?&lt;/B&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000" face="Arial"&gt;&lt;SPAN style="font-size: 13.3333330154419px; white-space: pre-wrap;"&gt;&lt;B&gt;Thanks for your patience,&lt;/B&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;: Hardware: &amp;nbsp; ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.3(2)2&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp setroute&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address xxx.89.50.122 255.255.255.248&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq ssh&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static any any unidirectional no-proxy-arp&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (any,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http xxx.89.50.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address xxx.89.50.124-xxx.89.50.126 inside&lt;BR /&gt;dhcpd enable inside&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:25:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ssh-from-external-to-internal/m-p/2757120#M192824</guid>
      <dc:creator>styler001</dc:creator>
      <dc:date>2019-03-12T06:25:33Z</dc:date>
    </item>
    <item>
      <title>You are trying to allow SSH</title>
      <link>https://community.cisco.com/t5/network-security/permit-ssh-from-external-to-internal/m-p/2757121#M192825</link>
      <description>&lt;P&gt;You are trying to allow SSH access from outside to the box or to a machine inside the network?&amp;nbsp;&lt;/P&gt;&lt;P&gt;To the box would be:&amp;nbsp;&lt;/P&gt;&lt;P&gt;ssh 0 0 outside (allowing any, you can make it more specific putting the subnet or host)&amp;nbsp;&lt;/P&gt;&lt;P&gt;aaa authentitcation ssh console LOCAL&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto key generate rsa mod 1024&amp;nbsp;&lt;/P&gt;&lt;P&gt;and then create a username and a password and you should be good.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If it is to allow access from outside to inside over ssh (and using the firewall IP to do port forward), you can do the following:&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network host&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;host x.x.x.x&amp;nbsp;&lt;/P&gt;&lt;P&gt;object service SSH&amp;nbsp;&lt;/P&gt;&lt;P&gt;service tcp source eq 22&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static host service SSH SSH&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any host x.x.x.x eq 22&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&amp;nbsp;&lt;/P&gt;&lt;P&gt;At this point, try to ssh to the Outside interface of the firewall, that should do it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you want to access it using the internal real IP address, modify the config I gave you to reflect the values you want (meaning on the interface keyword, using the same object "host")&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 17:23:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ssh-from-external-to-internal/m-p/2757121#M192825</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2015-08-14T17:23:28Z</dc:date>
    </item>
    <item>
      <title>ciscoasa(config)# nat (inside</title>
      <link>https://community.cisco.com/t5/network-security/permit-ssh-from-external-to-internal/m-p/2757122#M192827</link>
      <description>&lt;P&gt;ciscoasa(config)# nat (inside,outside) source static host service SSH SSH&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;^&lt;BR /&gt;ERROR: % Invalid input detected at '^' marker.&lt;BR /&gt;&lt;BR /&gt;ciscoasa(config)# access-list outside permit tcp any host 192.168.110.201 eq 22&lt;BR /&gt;ciscoasa(config)# access-group outside in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The error is detected at the first SSH&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 20:47:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ssh-from-external-to-internal/m-p/2757122#M192827</guid>
      <dc:creator>styler001</dc:creator>
      <dc:date>2015-08-14T20:47:58Z</dc:date>
    </item>
    <item>
      <title>Hi Mike,I have started over</title>
      <link>https://community.cisco.com/t5/network-security/permit-ssh-from-external-to-internal/m-p/2757123#M192829</link>
      <description>&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;I have started over again.&lt;/P&gt;&lt;P&gt;my intent is to allow access from outside to inside over ssh, as a simple test, using the firewall IP to do port forward. It appears from reading the builtin help as if I can do this purely via GUI, and without manually configuring NAT/ACL, simply by using the Firewall function "Public Servers" however this fails to work; I believe that command line work is required. While I'm not familiar with Cisco I've worked with Juniper, Sonicwall, iptables. Part of my problem is that a lot of the examples i can find on the net refer to older ASA version.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am on ASA 9.3 and I suspect the syntax differs from what you suggest, here is what I'm trying:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;a static one to one NAT as a simple test&lt;/P&gt;&lt;P&gt;ciscoasa(config)# object network vmware&lt;BR /&gt;ciscoasa(config-network-object)# host 192.168.1.6&lt;BR /&gt;ciscoasa(config-network-object)# nat (inside,outside) static 192.168.110.201&lt;BR /&gt;ERROR: Address 192.168.110.201 overlaps with outside interface address.&lt;BR /&gt;ERROR: NAT Policy is not downloaded&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;current error: tcp access denied by ACL from 192.168.110.199/41256 to outside 192.168110.201/22&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see no way using the GUI to assign another IP to the external interface.&lt;/P&gt;&lt;P&gt;ASA Version 9.3(2)2&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.110.201 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network VmwareHypervisor&lt;BR /&gt;&amp;nbsp;host 192.168.1.6&lt;BR /&gt;object network Vmware&lt;BR /&gt;&amp;nbsp;host 192.168.1.6&lt;BR /&gt;object network Public_Vmware&lt;BR /&gt;&amp;nbsp;host 192.168.110.202&lt;BR /&gt;object network public_outside&lt;BR /&gt;&amp;nbsp;host 192.168.110.201&lt;BR /&gt;object network host&lt;BR /&gt;&amp;nbsp;host 192.168.1.6&lt;BR /&gt;object service SSH&lt;BR /&gt;&amp;nbsp;service tcp source eq ssh&amp;nbsp;&lt;BR /&gt;object network vmware&lt;BR /&gt;&amp;nbsp;host 192.168.1.6&lt;BR /&gt;access-list outside_access_in extended permit tcp interface outside object VmwareHypervisor eq ssh&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp interface outside interface inside eq ssh&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit ip any any&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp interface outside interface inside eq ssh&amp;nbsp;&lt;BR /&gt;access-list ACL-OUTSIDE-IN extended permit tcp any host 192.168.1.6 eq ssh&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;! &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (any,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.110.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&amp;nbsp;&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 208.69.120.201 source outside&lt;BR /&gt;ntp server 23.226.142.216 source outside&lt;BR /&gt;ntp server 108.59.2.24 source outside&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 21:00:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ssh-from-external-to-internal/m-p/2757123#M192829</guid>
      <dc:creator>styler001</dc:creator>
      <dc:date>2015-08-14T21:00:00Z</dc:date>
    </item>
    <item>
      <title>object network vmwarehost 192</title>
      <link>https://community.cisco.com/t5/network-security/permit-ssh-from-external-to-internal/m-p/2757124#M192831</link>
      <description>&lt;P&gt;object network vmware&lt;BR /&gt;host 192.168.1.6&lt;BR /&gt;nat (inside,outside) static interface service tcp 22 22&lt;/P&gt;&lt;P&gt;in addition your acls are wrong ie.&lt;/P&gt;&lt;P&gt;the "inside_access_in" is permitting ip any any which is allowed by default from a higher to lower security interface so you may as well remove it ie. -&lt;/P&gt;&lt;P&gt;"no access-group inside_access_in in interface inside"&lt;/P&gt;&lt;P&gt;your "outside_access_in" acl makes no sense because the source will never be the interface IP address however your "ACL-OUTSIDE-IN" does make sense and is correct so can you replace the existing acl with that one ie. -&lt;/P&gt;&lt;P&gt;"access-group ACL-OUTSIDE-IN in interface outside"&lt;/P&gt;&lt;P&gt;from memory that should overwrite the existing entry. If it complains that there is already an acl applied to the outside interface then remove the existing one first ie.&lt;/P&gt;&lt;P&gt;"no access-group outside_access_in in interface outside"&lt;/P&gt;&lt;P&gt;You may also want to read this doc which gives an excellent overview of NAT post 8.3 and recommendations as to where to place certain rules etc. -&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/document/132066/asa-nat-83-nat-operation-and-configuration-format-cli"&gt;&lt;U&gt;&lt;FONT color="#0066cc"&gt;https://supportforums.cisco.com/document/132066/asa-nat-83-nat-operation-and-configuration-format-cli&lt;/FONT&gt;&lt;/U&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 21:47:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ssh-from-external-to-internal/m-p/2757124#M192831</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-08-14T21:47:18Z</dc:date>
    </item>
    <item>
      <title>Thank you for the</title>
      <link>https://community.cisco.com/t5/network-security/permit-ssh-from-external-to-internal/m-p/2757125#M192832</link>
      <description>&lt;P&gt;Thank you for the recommendations. I'm trying to use the GUI but I think i might actually be better off learning the cisco command line. I will try&amp;nbsp;your recommendations on Monday and report back in. also I could swear that the inside_access_in permitting ip any any was created by default by the ADSM GUI,&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 21:59:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ssh-from-external-to-internal/m-p/2757125#M192832</guid>
      <dc:creator>styler001</dc:creator>
      <dc:date>2015-08-14T21:59:18Z</dc:date>
    </item>
    <item>
      <title>It may have been created by</title>
      <link>https://community.cisco.com/t5/network-security/permit-ssh-from-external-to-internal/m-p/2757126#M192833</link>
      <description>&lt;P&gt;It may have been created by default, couldn't really say because I don't use the GUI.&lt;/P&gt;&lt;P&gt;You should be able to do all of the above using ASDM and there will be configuration examples on the Cisco site but I only know the CLI unfortunately.&lt;/P&gt;&lt;P&gt;See how you get on with it&amp;nbsp;next week and by all means come back if you need more help.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 22:09:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ssh-from-external-to-internal/m-p/2757126#M192833</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-08-14T22:09:02Z</dc:date>
    </item>
  </channel>
</rss>

