03-23-2023 07:08 AM
Is there a way to limit the amount of SSH sessions to the FTD CLI?
03-23-2023 09:58 AM
Not that i have seen any Limit ( we configured session timeout for 60seconds idle) - even we had 15 users we did not see limitation access alll.
But most FTD case its managed by FMC, you do not need many SSH connection, and not suggested to change any config when the device managed by FMC.
03-24-2023 04:07 AM
Thanks! So I basically do not want ability to have many SSH sessions opened up on the terminal (DDoS attack, etc.). You are saying there is no way to limit that on the FTD?
03-24-2023 04:52 AM
try using control-plane ACL and allow only specific host to SSH to your FTD
this can limit the SSH to only specific users
03-24-2023 06:43 AM - edited 03-24-2023 06:44 AM
An FTD device does not typically have management enabled on its Internet-facing interfaces. In that case, there is no listener for tcp port 22 (ssh).
If you do have the Internet-facing outside interface enabled for management (or your management interface is directly Internet-connected), you can use "configure ssh access-list" (which is one of the few things configured from the cli) to restrict acceptance of incoming ssh sessions to authorized addresses.
03-24-2023 06:50 AM
@Marvin Rhoads suggest is better than what I suggest
the SSH ACL is override the control-plane ACL so from my side I prefer use SSH ACL as @Marvin Rhoads suggest
thanks
03-24-2023 07:56 AM
Great thanks. I actually mean remote access for internal connections.
03-25-2023 12:56 AM
I actually mean remote access for internal connections. <--- Do you mean remote access VPN ?
03-27-2023 05:12 AM
No, just mean accessing it not via console. Accessing via an internal IP/subnet.
03-27-2023 06:38 AM
You cannot limit the number of ssh sessions but you can limit the addresses that are allowed to initiate with the "configure ssh access-list" command I mentioned earlier. That applies to any interface for which management access via ssh is permitted.
03-27-2023 06:41 AM
RIght, looks like best option. If SSH is only established to Mgmt interface then that is only interace where the ACL would need to be applied correct?
03-27-2023 06:51 AM
This configuration command is not like a traditional ACL on an ASA where it is applied to an interface. Rather it applies to all management plane ssh connections to the device. Those include the management interface only by default (and any others explicitly configured for management access).
03-27-2023 06:52 AM
yes correct
03-24-2023 07:47 AM
(DDoS attack, etc.) - Generally we allow only Mamanger access to login (based on the IP ) - not suggested to Open for any IP to try SSH and DoS attack,
you need to look more of hardening steps :
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide