01-28-2021 12:45 PM
Hello,
We're having a problem accessing an outside SFTP server and suspect the problem has to do with the ASA. The connection is unexpectedly dropped.
I seem to remember a while back having similar issues, but can not remember the solution.
Is there any special configuration that needs to be implemented to allow clients to access outside SFTP servers from inside the network?
Thanks
01-28-2021 03:03 PM
We would need more information, for example: is the connection dropped after a period of idle time? if yes, how long was the idle time before the connection dropped?
by default the ASA will drop idle connections after 1 hour of idle time. If this is happening to you then you can set the value to 0 which will leave the connection open indefinitely.
for example:
access-list sftp-timeout extended permit tcp 10.10.10.0 255.255.255.0 host 193.212.212.212 eq 22
class-map sftp-timeout
match access-list sftp-timeout
policy-map global_policy
class sftp-timeout
set connection timeout idle 0
01-28-2021 03:50 PM
01-28-2021 09:34 PM
Easiest way to tell if the firewall is affecting the traffic is to look at the packet captures of the INSIDE and OUTSIDE interfaces, attempt your connection to the external SFTP server, then look at the captures. If you see packets missing in either direction, then you know something is being filtered by the firewall. Easiest way to kick this off is using the ASDM packet capture wizard but you could do it via command line as well. I personally have not had issues passing SCP, SFTP, or SSH through my ASA but your mileage may vary. Please let us know what you find or if you need any further help.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide