cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1468
Views
8
Helpful
13
Replies

LImit max number of SSH sessions to FTD?

CiscoBrownBelt
Level 6
Level 6

Is there a way to limit the amount of SSH sessions to the FTD CLI?

13 Replies 13

balaji.bandi
Hall of Fame
Hall of Fame

Not that i have seen any Limit ( we configured session timeout for 60seconds idle) - even we had 15 users we did not see limitation access alll.

But most FTD case its managed by FMC, you do not need many SSH connection, and not suggested to change any config when the device managed by FMC.

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Thanks! So I basically do not want ability to have many SSH sessions opened up on the terminal (DDoS attack, etc.). You are saying there is no way to limit that on the FTD?

try using control-plane ACL and allow only specific host to SSH to your FTD 
this can limit the SSH to only specific users

An FTD device does not typically have management enabled on its Internet-facing interfaces. In that case, there is no listener for tcp port 22 (ssh).

If you do have the Internet-facing outside interface enabled for management (or your management interface is directly Internet-connected), you can use "configure ssh access-list" (which is one of the few things configured from the cli) to restrict acceptance of incoming ssh sessions to authorized addresses.

https://www.cisco.com/c/en/us/td/docs/security/firepower/command_ref/b_Command_Reference_for_Firepower_Threat_Defense/c_3.html#wp4200953591

@Marvin Rhoads  suggest is better than what I suggest 
the SSH ACL is override the control-plane ACL so from my side I prefer use SSH ACL as @Marvin Rhoads suggest 
thanks 

Great thanks. I actually mean remote access for internal connections. 

 I actually mean remote access for internal connections.   <--- Do you mean remote access VPN ?

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

No, just mean accessing it not via console. Accessing via an internal IP/subnet.

You cannot limit the number of ssh sessions but you can limit the addresses that are allowed to initiate with the "configure ssh access-list" command I mentioned earlier. That applies to any interface for which management access via ssh is permitted.

RIght, looks like best option. If SSH is only established to Mgmt interface then that is only interace where the ACL would need to be applied correct?

This configuration command is not like a traditional ACL on an ASA where it is applied to an interface. Rather it applies to all management plane ssh connections to the device. Those include the management interface only by default (and any others explicitly configured for management access).

yes correct

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

(DDoS attack, etc.)  - Generally we allow only Mamanger access to login (based on the IP ) - not suggested  to Open  for any IP to try SSH and DoS attack,

you need to look more of hardening steps :

https://www.cisco.com/c/en/us/td/docs/security/firepower/640/hardening/ftd/FTD_Hardening_Guide_v64.html

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Review Cisco Networking for a $25 gift card