<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Pix Firewall SSH listening on port 2022 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-pix-firewall-ssh-listening-on-port-2022/m-p/376045#M553910</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good thought but unfortunately, it will not work.  The only way we could accomplish something like this would be to use an upstream device (like an IOS router) to do the port translation (similar to the idea above).  Have it hit the upstream device on port 2022 and have that device translate the destination port to 22 and send it down to the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no mechanism to change the listening port for SSH on the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 13 Dec 2004 14:47:53 GMT</pubDate>
    <dc:creator>scoclayton</dc:creator>
    <dc:date>2004-12-13T14:47:53Z</dc:date>
    <item>
      <title>Cisco Pix Firewall SSH listening on port 2022</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-firewall-ssh-listening-on-port-2022/m-p/376042#M553907</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to tell the pix to listen on port 2022 for ssh ?&lt;/P&gt;&lt;P&gt;My provider is blocking port 22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edwin Gerritsen&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:48:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-firewall-ssh-listening-on-port-2022/m-p/376042#M553907</guid>
      <dc:creator>egerritsen</dc:creator>
      <dc:date>2020-02-21T07:48:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix Firewall SSH listening on port 2022</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-firewall-ssh-listening-on-port-2022/m-p/376043#M553908</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi edwin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are no explicit configurations, as per my knowledge that can change the SSH port on the PIX.. I dont think you can do this. It works on port 22. You can probably opt for the version of SSH , but not the port..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Dec 2004 13:04:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-firewall-ssh-listening-on-port-2022/m-p/376043#M553908</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2004-12-13T13:04:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix Firewall SSH listening on port 2022</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-firewall-ssh-listening-on-port-2022/m-p/376044#M553909</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This may or may not be possible so please correct me if its wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps you could use the "static" command to translate any SSH connections to the outside interface on port 2022 to the inside interface on port 22 thus allowing your external client to SSH to the internal interface of the PIX using port 2022 instead of 22.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so e.g. if your outside interface is 1.1.1 and your internal interface is 10.0.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2022 10.0.0.1 22 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;Paddy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Dec 2004 14:14:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-firewall-ssh-listening-on-port-2022/m-p/376044#M553909</guid>
      <dc:creator>paddyxdoyle</dc:creator>
      <dc:date>2004-12-13T14:14:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix Firewall SSH listening on port 2022</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-firewall-ssh-listening-on-port-2022/m-p/376045#M553910</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good thought but unfortunately, it will not work.  The only way we could accomplish something like this would be to use an upstream device (like an IOS router) to do the port translation (similar to the idea above).  Have it hit the upstream device on port 2022 and have that device translate the destination port to 22 and send it down to the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no mechanism to change the listening port for SSH on the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Dec 2004 14:47:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-firewall-ssh-listening-on-port-2022/m-p/376045#M553910</guid>
      <dc:creator>scoclayton</dc:creator>
      <dc:date>2004-12-13T14:47:53Z</dc:date>
    </item>
  </channel>
</rss>

