• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 2224
  • Last Modified:

Cisco 881 SSH access from outside

Hello,

We are using a Cisco 881 and would like to allow SSH to the router from outside (any source)

Currently we have a NAT inside and outside.

Please help with this. Router is running the latest firmware of 15.x I believe.

Thanks
0
masdf123
Asked:
masdf123
  • 3
  • 2
1 Solution
 
Istvan KalmarCommented:
Hi,


you need:

int loop 1
 ip add 1.1.1.1 255.255.255.25
 ip nat inside
ip nat inside source static tcp 1.1.1.1 22 x.x.x.x 22

where x.x.x.x the public ip of the router!

Best regards,
Istvan
0
 
Jody LemoineNetwork ArchitectCommented:
Once you enable SSH on the router, it it open from all sources by default. Outside access requires no further configuration unless you are using access lists or the zone based firewall to control traffic coming in from outside sources. If this is the case, you need to make sure that traffic to the router's public IP with destination port 22/tcp is permitted in the outside interface's access list (if you're just using access lists) or to the "self" zone (if you're using the zone based firewall.)
0
 
masdf123Author Commented:
jodylemoine, Could you guide me with the SSH enabling lines as well.

Thanks
0
How to change the world, one degree at a time.

By embracing technology, we can solve even the biggest problems—including the gender gap.  By earning a degree from WGU, you have an opportunity to gain the knowledge, credentials, and experience it takes to thrive in today’s high-growth IT industry.

 
Jody LemoineNetwork ArchitectCommented:
Sure.

From global configuration mode (conf t) do the following:

Set the hostname and domain names if you haven't already with:

hostname xxx
ip domain-name domain.com

Generate the encryption keys for ssh:

crypto key generate rsa modulus 2048

Set the default ssh version to 2.0:

ip ssh version 2

Write the configuration and you should be good to go.
0
 
masdf123Author Commented:
And if there are ACLs on the outside interface, I should just allow port 22 in, correct?
0
 
Jody LemoineNetwork ArchitectCommented:
Correct.  If you're not using the zone-based firewall or context-based access control, you'll want to make sure that your ACL permits return traffic too or you'll lose Internet access.  I recommend zone-based firewall or context-based access control, but the following will work in a pinch:

ip access-list extended InternetIn
 permit tcp any any established
 permit udp any any
 permit icmp any any
 permit tcp any any eq 22
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

  • 3
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now