<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH tunneling through pix in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-tunneling-through-pix/m-p/374407#M548989</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your setup looks good. Have you done a " clear xlate " after you have changed the NAT and Port Redirection ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you really just want to allow Port 22, 21, 80, 443 and dns from the inside network? Usually without an access-list on the inside interface all traffic from the higher inside interface to the lower outside interface is permitted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Third thing: Are you sure that on your other site you are allowed to ssh to your home network and that your ISP will not block also port 22. Change your SSH port to a port higher than 1024 example to: 2222 and try again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 22 Apr 2005 16:33:07 GMT</pubDate>
    <dc:creator>Patrick Iseli</dc:creator>
    <dc:date>2005-04-22T16:33:07Z</dc:date>
    <item>
      <title>SSH tunneling through pix</title>
      <link>https://community.cisco.com/t5/network-security/ssh-tunneling-through-pix/m-p/374406#M548988</link>
      <description>&lt;P&gt;Okay I am starting to go insane!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have setup a red hat box at home with the SSHD started and running. Now I have putty and cygwin on my PC at work, I am trying to setup an SSH tunnel back to my red hat box at home. I want to be able to use local port forwarding out my PC here at work to home through my cisco pix. So I have setup the following on the pix..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ip address outside interface (dhcp)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ip address inside 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Global (outside) 1 interface (dhcp address is 12.x.x.x)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Port Redirect &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static (inside, outside) tcp 12.x.x.x ssh 192.168.1.2 ssh netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-lists&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list inbound permit tcp any 192.168.1.2 eq 22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list inbound permit tcp any 192.168.1.2 eq 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list inbound permit tcp any any eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list inbound permit tcp any any eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list inbound permit tcp any any eq 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list inbound permit udp any any eq 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list outbound permit tcp any any eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list outbound permit tcp any any eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list outbond permit tcp any any eq 22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list outbound permit tcp any any eq 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list outbound permit tcp any any eq 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list outbound permit udp any any eq 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-group inbound in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-group outbound in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when apply the static port redirect all traffic stops passing in any direction and it locks up. I telnet from home and I see that it is stating that it can&amp;#146;t open portmap for outbound traffic and it is denying inbound traffic. But before I put the static port redirect in the show access-list I see hits on the ACL&amp;#146;s&amp;#133;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:05:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-tunneling-through-pix/m-p/374406#M548988</guid>
      <dc:creator>c.hamoeller</dc:creator>
      <dc:date>2020-02-21T08:05:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSH tunneling through pix</title>
      <link>https://community.cisco.com/t5/network-security/ssh-tunneling-through-pix/m-p/374407#M548989</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your setup looks good. Have you done a " clear xlate " after you have changed the NAT and Port Redirection ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you really just want to allow Port 22, 21, 80, 443 and dns from the inside network? Usually without an access-list on the inside interface all traffic from the higher inside interface to the lower outside interface is permitted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Third thing: Are you sure that on your other site you are allowed to ssh to your home network and that your ISP will not block also port 22. Change your SSH port to a port higher than 1024 example to: 2222 and try again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Apr 2005 16:33:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-tunneling-through-pix/m-p/374407#M548989</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-04-22T16:33:07Z</dc:date>
    </item>
    <item>
      <title>Re: SSH tunneling through pix</title>
      <link>https://community.cisco.com/t5/network-security/ssh-tunneling-through-pix/m-p/374408#M548990</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ISP allows SSH on 22 I was configuring it remotely and via ssh. &lt;/P&gt;&lt;P&gt;I put the access-list on for troubleshooting to see when the passing of traffic stops and what exactley happens. Yes you are correct I could just take it off and allow all traffic outbound. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not done a clear xlate after I have changed the NAT and Port redirection. This maybe the problem...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will have to try this now when I get home, and will let you know. thanks for the idea.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Apr 2005 16:40:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-tunneling-through-pix/m-p/374408#M548990</guid>
      <dc:creator>c.hamoeller</dc:creator>
      <dc:date>2005-04-22T16:40:19Z</dc:date>
    </item>
    <item>
      <title>Re: SSH tunneling through pix</title>
      <link>https://community.cisco.com/t5/network-security/ssh-tunneling-through-pix/m-p/374409#M548991</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;okay I have no problem with outbound traffic but the inbound still is failing. I see no hits on the access-list allowing SSH inbound with the port redirect. Any one else have some more ideas??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Apr 2005 12:17:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-tunneling-through-pix/m-p/374409#M548991</guid>
      <dc:creator>c.hamoeller</dc:creator>
      <dc:date>2005-04-29T12:17:09Z</dc:date>
    </item>
    <item>
      <title>Re: SSH tunneling through pix</title>
      <link>https://community.cisco.com/t5/network-security/ssh-tunneling-through-pix/m-p/374410#M548992</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Might it be that your PIX has also ssh configured ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Change the SSH port from 22 to another port for example 2222. And change the static to 2222.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no static (inside, outside) tcp 12.x.x.x ssh 192.168.1.2 ssh netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;Static (inside, outside) tcp 12.x.x.x 2222 192.168.1.2 2222 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;no Access-list outbond permit tcp any any eq 22&lt;/P&gt;&lt;P&gt;Access-list outbond permit tcp any any eq 2222 &lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;claer arp&lt;/P&gt;&lt;P&gt;wr mem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;of course change or add port 2222 on your ssh server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Apr 2005 23:56:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-tunneling-through-pix/m-p/374410#M548992</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-04-30T23:56:26Z</dc:date>
    </item>
    <item>
      <title>Re: SSH tunneling through pix</title>
      <link>https://community.cisco.com/t5/network-security/ssh-tunneling-through-pix/m-p/374411#M548993</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is it possible or likely that your network at work is filtering the SSH?  Our company LAN proxies and filters everything outbound. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your company is using something like Packeteer, it won't matter what port you send it out on; unless ssh traffic is explicitly permitted, it'll be dropped. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you find that it is being filtered, do not continue to get traffic out without getting permission. It could cost you your job (depending on the company policy). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could try sending the ssh out on port 80 (setting your pix for port 80 redirect to your RedHat box ... translate the port 80 to port 22 on the inside).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good Luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 May 2005 14:35:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-tunneling-through-pix/m-p/374411#M548993</guid>
      <dc:creator>scottmac</dc:creator>
      <dc:date>2005-05-01T14:35:55Z</dc:date>
    </item>
    <item>
      <title>Re: SSH tunneling through pix</title>
      <link>https://community.cisco.com/t5/network-security/ssh-tunneling-through-pix/m-p/374412#M548994</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anyone know how to stop users from doing ssh tunnels through the ASA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Apr 2006 14:14:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-tunneling-through-pix/m-p/374412#M548994</guid>
      <dc:creator>jcruz820</dc:creator>
      <dc:date>2006-04-19T14:14:51Z</dc:date>
    </item>
  </channel>
</rss>

