<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Connect to internal server via SSH in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/connect-to-internal-server-via-ssh/m-p/1780617#M533034</link>
    <description>&lt;P&gt;I have a vendor trying to connect to one of my servers.&amp;nbsp; To this point, he's been able to connect using a specific port.&amp;nbsp; I created an entry in my access list -&amp;nbsp;&amp;nbsp; access-list inbound permit tcp host xxx.xxx.xxx.xxx host 167.21.xxx.xxx eq 397.&amp;nbsp; He was able to connect for years using this entry.&amp;nbsp; Now, they want to connect via SSH.&amp;nbsp; So, I duplicated the entry and changed it to "eq SSH"&amp;nbsp; The vendor says he can't connect.&amp;nbsp; It just times out.&amp;nbsp; I don't have a packet sniffer to be able to look at the packets coming into the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there something else I need to do to allow SSH?&amp;nbsp; I'm a bit confused.&amp;nbsp; Thanks for any help you can provide - &lt;A href="mailto:asiegel@dover.de.us" target="_blank"&gt;asiegel@dover.de.us&lt;/A&gt; &lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 21:14:27 GMT</pubDate>
    <dc:creator>asiegel</dc:creator>
    <dc:date>2019-03-11T21:14:27Z</dc:date>
    <item>
      <title>Connect to internal server via SSH</title>
      <link>https://community.cisco.com/t5/network-security/connect-to-internal-server-via-ssh/m-p/1780617#M533034</link>
      <description>&lt;P&gt;I have a vendor trying to connect to one of my servers.&amp;nbsp; To this point, he's been able to connect using a specific port.&amp;nbsp; I created an entry in my access list -&amp;nbsp;&amp;nbsp; access-list inbound permit tcp host xxx.xxx.xxx.xxx host 167.21.xxx.xxx eq 397.&amp;nbsp; He was able to connect for years using this entry.&amp;nbsp; Now, they want to connect via SSH.&amp;nbsp; So, I duplicated the entry and changed it to "eq SSH"&amp;nbsp; The vendor says he can't connect.&amp;nbsp; It just times out.&amp;nbsp; I don't have a packet sniffer to be able to look at the packets coming into the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there something else I need to do to allow SSH?&amp;nbsp; I'm a bit confused.&amp;nbsp; Thanks for any help you can provide - &lt;A href="mailto:asiegel@dover.de.us" target="_blank"&gt;asiegel@dover.de.us&lt;/A&gt; &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:14:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connect-to-internal-server-via-ssh/m-p/1780617#M533034</guid>
      <dc:creator>asiegel</dc:creator>
      <dc:date>2019-03-11T21:14:27Z</dc:date>
    </item>
    <item>
      <title>Connect to internal server via SSH</title>
      <link>https://community.cisco.com/t5/network-security/connect-to-internal-server-via-ssh/m-p/1780618#M533035</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is the static nat entry that you have on the ASA for the internal server?? Is it one to one nat or port forwarding?? If it is port forwarding then you might need to add a static nat for it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Moreover, plz check on the server if port 22 is open on the machine, you can open it through the windows firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also if everything seems to be in place, you can take captures and logs from the PIX:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-1222"&gt;https://supportforums.cisco.com/docs/DOC-1222&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Aug 2011 18:15:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connect-to-internal-server-via-ssh/m-p/1780618#M533035</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-19T18:15:49Z</dc:date>
    </item>
    <item>
      <title>Connect to internal server via SSH</title>
      <link>https://community.cisco.com/t5/network-security/connect-to-internal-server-via-ssh/m-p/1780619#M533038</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm using an old PIX515e.&amp;nbsp; The server is an AS400 with a one to one static NAT - no port forwarding.&amp;nbsp; The vendor was connected to the server via port 397 and said he didn't see any port 22 traffic getting to the server, so he believes it is being stopped at the firewall.&amp;nbsp; I will look at the link you listed and see if I can capture some information.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise, is there anything else I would need to do other than the access-list entry?&amp;nbsp; I don't see a fixup protocol for SSH like I do for other protocols.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;fixup protocol dns maximum-length 512&lt;BR /&gt;fixup protocol ftp 21&lt;BR /&gt;fixup protocol h323 h225 1720&lt;BR /&gt;fixup protocol h323 ras 1718-1719&lt;BR /&gt;fixup protocol http 80&lt;BR /&gt;fixup protocol ils 389&lt;BR /&gt;fixup protocol rsh 514&lt;BR /&gt;fixup protocol rtsp 554&lt;BR /&gt;fixup protocol sip 5060&lt;BR /&gt;fixup protocol sip udp 5060&lt;BR /&gt;fixup protocol skinny 2000&lt;BR /&gt;fixup protocol smtp 25&lt;BR /&gt;fixup protocol sqlnet 1521&lt;BR /&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could that be an issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Aug 2011 18:43:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connect-to-internal-server-via-ssh/m-p/1780619#M533038</guid>
      <dc:creator>asiegel</dc:creator>
      <dc:date>2011-08-19T18:43:26Z</dc:date>
    </item>
    <item>
      <title>Connect to internal server via SSH</title>
      <link>https://community.cisco.com/t5/network-security/connect-to-internal-server-via-ssh/m-p/1780620#M533040</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could be an issue, you need to add a fix up for ssh as well. The best troubleshooting would be to take captures, see if the request is being received for port 22 and if the firewall forwards it to the server. Do take logs as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do let me know the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Aug 2011 18:47:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connect-to-internal-server-via-ssh/m-p/1780620#M533040</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-19T18:47:39Z</dc:date>
    </item>
  </channel>
</rss>

