<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firewall and SSH in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-and-ssh/m-p/2092647#M394741</link>
    <description>&lt;P&gt;We have a Cisco Firewall 5510.&lt;/P&gt;&lt;P&gt;When I VPN into the network, I have to rdp to a windows desktop in order to SSH into my linux boxes.&lt;/P&gt;&lt;P&gt;Please show me how to ssh ditrectly from home PC.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 00:32:18 GMT</pubDate>
    <dc:creator>Duong Nguyen</dc:creator>
    <dc:date>2019-03-12T00:32:18Z</dc:date>
    <item>
      <title>Firewall and SSH</title>
      <link>https://community.cisco.com/t5/network-security/firewall-and-ssh/m-p/2092647#M394741</link>
      <description>&lt;P&gt;We have a Cisco Firewall 5510.&lt;/P&gt;&lt;P&gt;When I VPN into the network, I have to rdp to a windows desktop in order to SSH into my linux boxes.&lt;/P&gt;&lt;P&gt;Please show me how to ssh ditrectly from home PC.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:32:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-and-ssh/m-p/2092647#M394741</guid>
      <dc:creator>Duong Nguyen</dc:creator>
      <dc:date>2019-03-12T00:32:18Z</dc:date>
    </item>
    <item>
      <title>Firewall and SSH</title>
      <link>https://community.cisco.com/t5/network-security/firewall-and-ssh/m-p/2092648#M394742</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can already access some server/computer remotely through VPN connection, you should be able to configure the ASA to include those other devices too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can provide your ASA configuration (removing any sensitive information from it) we can go through the needed configurations steps for you to be able to directly use the VPN Client computer to access the remote devices with SSH.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you post the configuration here, please also provide the IP addresses (or a network/subnet) of the devices you need to access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2012 22:22:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-and-ssh/m-p/2092648#M394742</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-04T22:22:30Z</dc:date>
    </item>
    <item>
      <title>Firewall and SSH</title>
      <link>https://community.cisco.com/t5/network-security/firewall-and-ssh/m-p/2092649#M394743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry I made a mistake.&lt;/P&gt;&lt;P&gt;It only when I ssh or rdp from home&amp;nbsp; my vpn connection at work, and try to connect with servers at another location using a point to ppoint vpn that ssh and rdp doesnt work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2012 00:50:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-and-ssh/m-p/2092649#M394743</guid>
      <dc:creator>Duong Nguyen</dc:creator>
      <dc:date>2012-12-12T00:50:58Z</dc:date>
    </item>
    <item>
      <title>Firewall and SSH</title>
      <link>https://community.cisco.com/t5/network-security/firewall-and-ssh/m-p/2092650#M394744</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did I undestand you correctly, is the situation the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You connect to the company network from home with VPN Client&lt;/LI&gt;&lt;LI&gt;The Linux boxes are located behind a L2L VPN connection thats between the same VPN device that you connect to with the VPN Client&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you would need to confirm is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;That the remote network(s) that holds these Linux box is included in the VPN Client Split tunnel configurations&lt;UL&gt;&lt;LI&gt;If the VPN Client is configured to tunnel all traffic you dont have to do anything&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;You have to make sure that the traffic from the VPN Client pool is also allowed to the L2L VPN or if possible NAT the VPN Client users to some address that is already configured on the tunnel&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is also other factors to the this setup but I can only give some general advice without actually seeing your ASA firewall configuration. If you want you can post that for us to go through (remove any sensitive information like public IP:s, username/passwords, etc)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2012 07:24:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-and-ssh/m-p/2092650#M394744</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-12T07:24:14Z</dc:date>
    </item>
  </channel>
</rss>

