12-25-2019 11:41 AM
Hello,
I am trying to allow ssh to my internal sever.
I basically used the same configuration which was configured for port 80 or 443 on ASA.
object network linux
host 192.168.1.123
object service sshlinux
service tcp source eq ssh
access-list outside-in extended permit tcp any host 192.168.1.123 eq ssh
nat (inside,outside) source static linux interface service sshlinux sshlinux
access-group Outside-in in interface outside
Please suggest where the issue:
Thanks in advance
Solved! Go to Solution.
01-02-2020 11:54 AM
12-25-2019 01:58 PM
your configuraton look good.
run a packet tracer
packet-tracer input outside tcp 8.8.8.8 12345 (firewall outside ip address) ssh
12-30-2019 06:44 AM
Thanks @Sheraz.Salim, But I don't have PT installed. SSH Port is still closed for my Public IP address.
12-30-2019 12:11 PM
I am not talking about Packet Tracer software for cisco student network learning. I am talking Packet Tracer utility in ASA software code.
here is a link
https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/I-R/cmdref2/p1.html
12-31-2019 08:43 AM - edited 01-03-2020 05:59 AM
Thanks for providing the link. I am very new for Cisco devices.
Here is the output:
packet-tracer input outside tcp 8.8.8.8 12345 XXX.XXX.XXX.XXX ssh
Phase: 1
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
nat (inside,outside) source static linux interface service sshlinux sshlinux
Additional Information:
NAT divert to egress interface inside
Untranslate XXX.XXX.XXX.XXX/22 to 192.168.1.123/22
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: DROP
Config:
Implicit Rule
Additional Information:
Result:
input-interface: outside
input-status: up
input-line-status: up
output-interface: inside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
packets are dropping becuase of acl,
here is my acl:
access-list outside-in extended permit tcp any host 192.168.1.123 eq ssh
12-31-2019 11:53 AM
could you share your firewall configuration?
01-02-2020 11:54 AM
01-03-2020 06:06 AM
Thanks @Elliot Dierksen
Just trying to understand, as per packet tracer, packets were dropped becuase of acl configuration. And another thing, I am not able to ssh into router which tells me router is not configured to login via ssh. So ssh port was not configured so why it wasn't allowing me to use port 22. Thanks in advance.
It is working now with assigning diferent port on outside and translate to ssh inside.
01-03-2020 06:14 AM
As it pertains to SSH, I think that port is allocated whether it is configured or not. That is not true for HTTP and HTTPS as I have been able to pass those ports through. If you look in the logs, I doubt you will see an ACL deny. SSH going to the ASA itself would be permitted or denied by the "ssh" directives (if any) in the config.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide