<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5506-X NAT issue SSH in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5506-x-nat-issue-ssh/m-p/3798388#M7183</link>
    <description>&lt;P&gt;try below command to check where is the drop.&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# packet-tracer input outside tcp 8.8.8.8 65123 &amp;lt;external-IP&amp;gt; 22&lt;/P&gt;</description>
    <pubDate>Sat, 09 Feb 2019 14:12:40 GMT</pubDate>
    <dc:creator>Kasun Bandara</dc:creator>
    <dc:date>2019-02-09T14:12:40Z</dc:date>
    <item>
      <title>ASA 5506-X NAT issue SSH</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-nat-issue-ssh/m-p/3797494#M7174</link>
      <description>&lt;P&gt;I feel like I'm on the cusp of figuring it out, but I've had issues and spent many, many hours hitting this with every form of documentation and help forum. I'm trying to do a NAT with an ACL from an external static IP to an internal one on a DMZ.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To try and be as clear and concise as I can: I have a static external IP. This is routed by my ISP to an intermediate IP, which is assigned to my ASA 5506-X. E.g. 8.8.8.8 (external) assigned to 1.2.3.4 (internal, assigned to my outside interface). I have a DMZ, where I'm trying to NAT port 22 from my external IP through to that sub network using PAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've cleared some of the running config, and removed some sensitive information, but I hope this is enough to clarify my issue. Italicized is what I think is most relevant. I've included packet tracers for both 8.8.8.8 to my external IP, and 8.8.8.8 to the internal one (not the given one assigned to Outside but the actual SSH server). I'm still unable to SSH in, even though an 8.8.8.8 tcp on 22 is "allowed" to the DMZ from outside.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object network ssh&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;host 192.168.10.10&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_DMZ extended permit tcp any object ssh eq ssh &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_SSH_DMZ extended permit tcp any host 192.168.10.10 eq ssh log&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object network ssh&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;nat (dmz,outside) static &amp;lt;external IP&amp;gt; service tcp ssh ssh &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-group outside_SSH_DMZ in interface outside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Running Config&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;&lt;BR /&gt;:&lt;BR /&gt;: Serial Number:&lt;BR /&gt;: Hardware:&amp;nbsp;&amp;nbsp; ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.8(1)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password &amp;lt;hashed mess&amp;gt;&lt;BR /&gt;names&lt;BR /&gt;dns-guard&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address &amp;lt;intermediate internal IP&amp;gt; 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_1&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_3&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_4&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_5&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_6&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_7&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup inside_1&lt;BR /&gt;dns domain-lookup inside_3&lt;BR /&gt;dns domain-lookup inside_4&lt;BR /&gt;dns domain-lookup inside_5&lt;BR /&gt;dns domain-lookup inside_6&lt;BR /&gt;dns domain-lookup inside_7&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 1.1.1.1 outside&lt;BR /&gt;&amp;nbsp;name-server 1.0.0.1 outside&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network obj_any1&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any2&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any3&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any4&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any5&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any6&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any7&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network DMZ&lt;BR /&gt;object network ssh&lt;BR /&gt;&amp;nbsp;host 192.168.10.10&lt;BR /&gt;access-list outside_DMZ extended permit tcp any object ssh eq ssh&lt;BR /&gt;access-list outside_SSH_DMZ extended permit tcp any host 192.168.10.10 eq ssh log&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside_1 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu inside_3 1500&lt;BR /&gt;mtu inside_4 1500&lt;BR /&gt;mtu inside_5 1500&lt;BR /&gt;mtu inside_6 1500&lt;BR /&gt;mtu inside_7 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;!&lt;BR /&gt;object network obj_any1&lt;BR /&gt;&amp;nbsp;nat (inside_1,outside) dynamic interface&lt;BR /&gt;object network obj_any3&lt;BR /&gt;&amp;nbsp;nat (inside_3,outside) dynamic interface&lt;BR /&gt;object network obj_any4&lt;BR /&gt;&amp;nbsp;nat (inside_4,outside) dynamic interface&lt;BR /&gt;object network obj_any5&lt;BR /&gt;&amp;nbsp;nat (inside_5,outside) dynamic interface&lt;BR /&gt;object network obj_any6&lt;BR /&gt;&amp;nbsp;nat (inside_6,outside) dynamic interface&lt;BR /&gt;object network obj_any7&lt;BR /&gt;&amp;nbsp;nat (inside_7,outside) dynamic interface&lt;BR /&gt;object network ssh&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static &amp;lt;external IP&amp;gt; service tcp ssh ssh&lt;BR /&gt;access-group outside_SSH_DMZ in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 &amp;lt;internal intermediate IP&amp;gt; 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;Packet Tracer External IP to Internal&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;ciscoasa(config)# packet-tracer input outside tcp 8.8.8.8 22 192.168.10.10 22&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 192.168.10.10 using egress ifc&amp;nbsp; dmz&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_SSH_DMZ in interface outside&lt;BR /&gt;access-list outside_SSH_DMZ extended permit tcp any host 192.168.10.10 eq ssh log&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;object network ssh&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static &amp;lt;external-IP&amp;gt; service tcp ssh ssh&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: dmz&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;STRONG&gt;&amp;nbsp;Packet Tracer External IP to External&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# packet-tracer input outside tcp 8.8.8.8 22 &amp;lt;external-IP&amp;gt; 22&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network ssh&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static &amp;lt;external-IP&amp;gt; service tcp ssh ssh&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface dmz&lt;BR /&gt;Untranslate &amp;lt;external-IP&amp;gt;/22 192.168.10.10/22&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_SSH_DMZ in interface outside&lt;BR /&gt;access-list outside_SSH_DMZ extended permit tcp any host 192.168.10.10 eq ssh log&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network ssh&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static &amp;lt;external-IP&amp;gt; service tcp ssh ssh&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 19180, packet dispatched to next module&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: dmz&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:47:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-nat-issue-ssh/m-p/3797494#M7174</guid>
      <dc:creator>david.brewerton</dc:creator>
      <dc:date>2020-02-21T16:47:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X NAT issue SSH</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-nat-issue-ssh/m-p/3797552#M7179</link>
      <description>&lt;P&gt;Hi check below command,&lt;BR /&gt;access-list outside_DMZ extended permit tcp any object ssh eq ssh&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;normally source devices using random private port to communicate with other devices. destination port is ok as SSH port. for ex. &lt;BR /&gt;source - 8.8.8.8&lt;BR /&gt;source port - 65128&lt;BR /&gt;destination - NAT IP&lt;BR /&gt;destination port - 22&lt;BR /&gt;&lt;BR /&gt;source device not using SSH port as a source port to communicate. so try allowing any source port to contact the destination 22 port&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;&lt;BR /&gt;let us know how it goes.&lt;BR /&gt;please rate helpful things..&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 09:36:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-nat-issue-ssh/m-p/3797552#M7179</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2019-02-08T09:36:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X NAT issue SSH</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-nat-issue-ssh/m-p/3797904#M7182</link>
      <description>&lt;P&gt;Hi, my apologies for the poor naming. That's an object I created called ssh. However it isn't attached to the outside interface (which if you can let me know if that's relevant or not would be good to know). The primary hits I'm looking at in ASDM are for&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list outside_SSH_DMZ extended permit tcp any host 192.168.10.10 eq ssh log&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Below is the ssh object. If I understand the above command: tcp any source going to host 192.168.10.10 port 22.&lt;/P&gt;&lt;P&gt;The other object if I understand correctly is anything matching my ssh object, so going to host 192.168.10.10 on NAT hitting the service ssh. If I'm to re-write the nat rule &lt;EM&gt;&amp;nbsp;nat (dmz,outside) static &amp;lt;external IP&amp;gt; service tcp ssh ssh &lt;/EM&gt;for any external source port,&amp;nbsp; how would I do that? &lt;EM&gt;&amp;nbsp;nat (dmz,outside) static &amp;lt;external IP&amp;gt; service tcp any ssh??? &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object network ssh&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;host 192.168.10.10&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object network ssh&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;nat (dmz,outside) static &amp;lt;external IP&amp;gt; service tcp ssh ssh &lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 16:04:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-nat-issue-ssh/m-p/3797904#M7182</guid>
      <dc:creator>david.brewerton</dc:creator>
      <dc:date>2019-02-08T16:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X NAT issue SSH</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-nat-issue-ssh/m-p/3798388#M7183</link>
      <description>&lt;P&gt;try below command to check where is the drop.&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# packet-tracer input outside tcp 8.8.8.8 65123 &amp;lt;external-IP&amp;gt; 22&lt;/P&gt;</description>
      <pubDate>Sat, 09 Feb 2019 14:12:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-nat-issue-ssh/m-p/3798388#M7183</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2019-02-09T14:12:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X NAT issue SSH</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-nat-issue-ssh/m-p/3798437#M7184</link>
      <description>&lt;P&gt;ciscoasa(config)# packet-tracer input outside tcp 8.8.8.8 65123 40.&amp;lt;external-ip&amp;gt; 22&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network ssh&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static 40.132.235.222 service tcp ssh ssh&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface dmz&lt;BR /&gt;Untranslate 40.132.235.222/22 to 192.168.10.10/22&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_SSH_DMZ in interface outside&lt;BR /&gt;access-list outside_SSH_DMZ extended permit tcp any host 192.168.10.10 eq ssh log&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network ssh&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static 40.132.235.222 service tcp ssh ssh&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 10&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 163838, packet dispatched to next module&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: dmz&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's the weird part. It's allowed. But when I try to just ssh in from the external IP, both internally and from other sources, it just rejects it. I can ssh internally, so I know the sshd daemon is allowing it. The auth log says nothing of a failed attempt or me even reaching it. SSH connect to host port 22: resource temporarily unavailable. An nmap scan of my external port 22 says it's filtered.&lt;/P&gt;&lt;P&gt;To add: tcp6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 :::22&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :::*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LISTEN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15969/sshd&lt;/P&gt;&lt;P&gt;It's not just listening on localhost&lt;/P&gt;&lt;P&gt;I tried just to do it from the other end (try SSH, since it seems packet-tracer isn't replicating it correctly).&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;3&lt;/TD&gt;&lt;TD&gt;Feb 09 2019&lt;/TD&gt;&lt;TD&gt;09:18:23&lt;/TD&gt;&lt;TD&gt;710003&lt;/TD&gt;&lt;TD&gt;&amp;lt;external ip&amp;gt;&lt;/TD&gt;&lt;TD&gt;61152&lt;/TD&gt;&lt;TD&gt;&amp;lt;intermediate internal-ip&amp;gt;&lt;/TD&gt;&lt;TD&gt;22&lt;/TD&gt;&lt;TD&gt;TCP access denied by ACL from &amp;lt;external-ip&amp;gt;/61152 to outside:&amp;lt;intermediate internal-ip&amp;gt;/22&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Do I need a separate ACL to go from my external to my intermediate IP?&lt;/P&gt;</description>
      <pubDate>Sat, 09 Feb 2019 16:24:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-nat-issue-ssh/m-p/3798437#M7184</guid>
      <dc:creator>david.brewerton</dc:creator>
      <dc:date>2019-02-09T16:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X NAT issue SSH</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-nat-issue-ssh/m-p/3798445#M7185</link>
      <description>&lt;P&gt;Thanks for your help. You helped me think outside of the box. So I did some digging in the logs, and just tested SSH against it and watched logs. It turns out, it needed a NAT against my outside interface (the internal IP address attached to the outside interface) and not the external IP that is forwarded to my outside interface.&lt;/P&gt;&lt;P&gt;So I did that, it was then considered a "real IP packet" that was being denied, it even let me create an ACL rule based on it, I changed it based on your suggestion (any external port, since it tried a bunch of arbitrary ports in the 6000 range), and ta-da it works! Thanks.&lt;/P&gt;</description>
      <pubDate>Sat, 09 Feb 2019 16:47:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-nat-issue-ssh/m-p/3798445#M7185</guid>
      <dc:creator>david.brewerton</dc:creator>
      <dc:date>2019-02-09T16:47:25Z</dc:date>
    </item>
  </channel>
</rss>

