<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block SSH and allow SFTP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-ssh-and-allow-sftp/m-p/1151731#M874798</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is NOT an acceptable solution.  Let say that your SSH server is located in the DMZ network and that you want to make it accessible to both Intranet and Internet users.  With Intranet users, you want to give them the option to use either ssh version 1 or version 2; however, for Internet users, they are forced to use ssh version 2 for enhanced security.  Most people want to it on the firewall which makes sense.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 20 Mar 2009 13:54:07 GMT</pubDate>
    <dc:creator>cisco24x7</dc:creator>
    <dc:date>2009-03-20T13:54:07Z</dc:date>
    <item>
      <title>Block SSH and allow SFTP</title>
      <link>https://community.cisco.com/t5/network-security/block-ssh-and-allow-sftp/m-p/1151727#M874791</link>
      <description>&lt;P&gt;Hello Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way to block SSH and allow only SFTP?&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:07:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ssh-and-allow-sftp/m-p/1151727#M874791</guid>
      <dc:creator>harish.ab</dc:creator>
      <dc:date>2019-03-11T15:07:40Z</dc:date>
    </item>
    <item>
      <title>Re: Block SSH and allow SFTP</title>
      <link>https://community.cisco.com/t5/network-security/block-ssh-and-allow-sftp/m-p/1151728#M874794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No - SSH and SFTP use the same default TCP port of 22.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now what you can do is change the server to use a different SFTP port instead of TCP/22 - to something else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Mar 2009 08:53:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ssh-and-allow-sftp/m-p/1151728#M874794</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-03-20T08:53:36Z</dc:date>
    </item>
    <item>
      <title>Re: Block SSH and allow SFTP</title>
      <link>https://community.cisco.com/t5/network-security/block-ssh-and-allow-sftp/m-p/1151729#M874795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How do you block ssh version 1 and allow only ssh version 2 across the ASA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Mar 2009 09:45:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ssh-and-allow-sftp/m-p/1151729#M874795</guid>
      <dc:creator>newatcisco</dc:creator>
      <dc:date>2009-03-20T09:45:17Z</dc:date>
    </item>
    <item>
      <title>Re: Block SSH and allow SFTP</title>
      <link>https://community.cisco.com/t5/network-security/block-ssh-and-allow-sftp/m-p/1151730#M874797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;AFAIK - the ASA will not inspect the version of SSH as it passes thru it.  If you only want to allow version 2 of SSH - then configure the server to only accept version 2&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Mar 2009 10:22:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ssh-and-allow-sftp/m-p/1151730#M874797</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-03-20T10:22:27Z</dc:date>
    </item>
    <item>
      <title>Re: Block SSH and allow SFTP</title>
      <link>https://community.cisco.com/t5/network-security/block-ssh-and-allow-sftp/m-p/1151731#M874798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is NOT an acceptable solution.  Let say that your SSH server is located in the DMZ network and that you want to make it accessible to both Intranet and Internet users.  With Intranet users, you want to give them the option to use either ssh version 1 or version 2; however, for Internet users, they are forced to use ssh version 2 for enhanced security.  Most people want to it on the firewall which makes sense.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Mar 2009 13:54:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ssh-and-allow-sftp/m-p/1151731#M874798</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2009-03-20T13:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: Block SSH and allow SFTP</title>
      <link>https://community.cisco.com/t5/network-security/block-ssh-and-allow-sftp/m-p/1151732#M874799</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So how do you configure the firewall to filter on the version then, as the version is session based information?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Mar 2009 14:14:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ssh-and-allow-sftp/m-p/1151732#M874799</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-03-20T14:14:46Z</dc:date>
    </item>
    <item>
      <title>Re: Block SSH and allow SFTP</title>
      <link>https://community.cisco.com/t5/network-security/block-ssh-and-allow-sftp/m-p/1151733#M874800</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have not used ASA in a while so I could be wrong here but it can not be done on ASA appliance.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other vendors such as Juniper and Checkpoint, you can define a service "ssh" and "ssh_version_2".  That way, the firewall can look at the initial hand-shake of the ssh connection and determine whether it is an ssh version 1 or ssh version 2 connection.  If you specify ssh, it will assume both version 1 and version 2.  If you specify ssh version_2, it will only accept only version through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For intranet users, you use ssh.  For Internet users that require enhanced security, only ssh version 2 is allowed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Mar 2009 15:12:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ssh-and-allow-sftp/m-p/1151733#M874800</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2009-03-20T15:12:37Z</dc:date>
    </item>
  </channel>
</rss>

