Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

PIX 515 and SSH

Posted on 2003-03-18
7
Medium Priority
?
309 Views
Last Modified: 2013-11-16
I am trying to figure out how to give access to outside vendors to inside servers through SSH. I have been able to coonct to the PIX using SSH but how do Iconfigure the PIX to allow outside clients to get to inside resouses using SSH?
0
Comment
Question by:trath
  • 2
4 Comments
 
LVL 4

Expert Comment

by:ferg-o
ID: 8163851
My PIX is a bit rusty but you'll have to create a static  for each Internal server they want to access and forward TCP 22.

Be careful configuring sshd - make sure you only allow the outside vendor hosts - you are punching a hole through your firewall.
0
 
LVL 3

Author Comment

by:trath
ID: 8168349
I am looking for the exact commands on how to do a static traslation on a PIX. I appreciate your help
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 1000 total points
ID: 8187909
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 12487313
My comment included a link to another of my own comments that exactly answers the question.
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
Spectre and Meltdown, how it affects me and my clients?
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

581 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question