asked on
access-list outside_access_in permit tcp any any eq ssh
static (inside,outside) tcp (PUBLIC_IP) ssh 192.168.55.1 ssh netmask 255.255.255.255 0 0
ASKER
Cisco PIX is a dedicated hardware firewall appliance; the Cisco Adaptive Security Appliance (ASA) is a firewall and anti-malware security appliance that provides unified threat management and protection the PIX does not. Other Cisco devices and systems include routers, switches, storage networking, wireless and the software and hardware for PIX Firewall Manager (PFM), PIX Device Manager (PDM) and Adaptive Security Device Manager (ASDM).
TRUSTED BY
Firstly, configuring SSH access to the 192.168 interface is fairly useless, since you will be required to use the public interface when you connect to it.
Once he has allocated a public address to the device, it can be configured as follows:
Enter Enable mode. (en)
Enter Configuration mode. (conf t)
Type the following:
ssh A.B.C.D 255.255.255.255 outside
ssh 192.168.Y.Z 255.255.255.255 inside
(I'm assuming you've named the outside and inside interfaces as such)
A.B.C.D will be the public address the you will be connecting FROM.
192.168.Y.Z will be a private address inside the network.
It's always best to limit SSH access to a specific host.
If you'd like to open it up to a bigger range, simply change the subnet mask as required.
It's also a good idea to set your SSH timeout. I think the default is 60 seconds but you can change this according to your own preferences.
Command:
ssh timeout 120