Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium


PIX 515 and SSH

Posted on 2003-03-18
Medium Priority
Last Modified: 2013-11-16
I am trying to figure out how to give access to outside vendors to inside servers through SSH. I have been able to coonct to the PIX using SSH but how do Iconfigure the PIX to allow outside clients to get to inside resouses using SSH?
Question by:trath
  • 2

Expert Comment

ID: 8163851
My PIX is a bit rusty but you'll have to create a static  for each Internal server they want to access and forward TCP 22.

Be careful configuring sshd - make sure you only allow the outside vendor hosts - you are punching a hole through your firewall.

Author Comment

ID: 8168349
I am looking for the exact commands on how to do a static traslation on a PIX. I appreciate your help
LVL 79

Accepted Solution

lrmoore earned 1000 total points
ID: 8187909
LVL 79

Expert Comment

ID: 12487313
My comment included a link to another of my own comments that exactly answers the question.

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
Spectre and Meltdown, how it affects me and my clients?
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

581 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question