Re: CISCO FW IOS with allowing SSH to it from outside

From: NoOne Important (lm_nguyen@xxxxxxxxxxx)
Date: Wed Feb 14 2001 - 17:25:13 GMT-3


   
<html><DIV>
<P><BR><BR></P>
<DIV></DIV>
<P>If you have the access-list permit any any in the route-map then when the re
turn traffic coming back to whereever you telnet or ssh from will get translate
d by your pool hence the tcp session got screw up.&nbsp; If you telnet or ssh f
rom a sun machine, turn on snoop to see.&nbsp; Also use debug ip nat detail on
your router to see the translation.&nbsp; One way is just to permit the inside
network through access-list 160...if not you could deny your wan ip first then
permit any any.</P></DIV>
<P><BR><BR>&nbsp;</P>
<DIV></DIV>
<DIV></DIV>
<DIV></DIV>
<DIV></DIV>
<DIV></DIV>&gt;From: "Sam Munzani" <SAM@MUNZANI.COM>
<DIV></DIV>
<DIV></DIV>&gt;Reply-To: "Sam Munzani" <SAM@MUNZANI.COM>
<DIV></DIV>
<DIV></DIV>&gt;To: "Rampley, Jim" <JIM.RAMPLEY@AGEDWARDS.COM>
<DIV></DIV>
<DIV></DIV>&gt;CC: <CCIELAB@GROUPSTUDY.COM>
<DIV></DIV>
<DIV></DIV>&gt;Subject: Re: CISCO FW IOS with allowing SSH to it from outside
<DIV></DIV>
<DIV></DIV>&gt;Date: Wed, 14 Feb 2001 14:02:17 -0600
<DIV></DIV>
<DIV></DIV>&gt;
<DIV></DIV>
<DIV></DIV>&gt;RE: CISCO FW IOS with allowing SSH to it from outsideIf you don'
t apply =
<DIV></DIV>
<DIV></DIV>&gt;and outbound access-list, that means you permit everything outbo
und with =
<DIV></DIV>
<DIV></DIV>&gt;stateful inspection. Inbound is taken care by drilling holes in
=
<DIV></DIV>
<DIV></DIV>&gt;access-list. I don't have much luck with it so far. Telnet from
inside =
<DIV></DIV>
<DIV></DIV>&gt;works great though.
<DIV></DIV>
<DIV></DIV>&gt;
<DIV></DIV>
<DIV></DIV>&gt;Sam
<DIV></DIV>
<DIV></DIV>&gt; ----- Original Message -----=20
<DIV></DIV>
<DIV></DIV>&gt; From: Rampley, Jim=20
<DIV></DIV>
<DIV></DIV>&gt; To: 'Sam Munzani' ; Ron.Fuller@3x.com=20
<DIV></DIV>
<DIV></DIV>&gt; Cc: ccielab@groupstudy.com ; NoOne Important ; nobody@groupstud
y.com=20
<DIV></DIV>
<DIV></DIV>&gt; Sent: Wednesday, February 14, 2001 1:43 PM
<DIV></DIV>
<DIV></DIV>&gt; Subject: RE: CISCO FW IOS with allowing SSH to it from outside
<DIV></DIV>
<DIV></DIV>&gt;
<DIV></DIV>
<DIV></DIV>&gt;
<DIV></DIV>
<DIV></DIV>&gt;
<DIV></DIV>
<DIV></DIV>&gt;
<DIV></DIV>
<DIV></DIV>&gt; Don't you need an outbound access-list on fa0/1? I just set thi
s up a =
<DIV></DIV>
<DIV></DIV>&gt;few weeks back from the doc CD examples and was able to telnet b
oth =
<DIV></DIV>
<DIV></DIV>&gt;ways.
<DIV></DIV>
<DIV></DIV>&gt;
<DIV></DIV>
<DIV></DIV>&gt; Jim=20
<DIV></DIV>
<DIV></DIV>&gt;
<DIV></DIV>
<DIV></DIV>&gt;
<DIV></DIV>
<DIV></DIV>&gt;
<DIV></DIV>
<DIV></DIV>&gt; -----Original Message-----=20
<DIV></DIV>
<DIV></DIV>&gt; From: Sam Munzani [SMTP:sam@munzani.com]=20
<DIV></DIV>
<DIV></DIV>&gt; Sent: Tuesday, February 13, 2001 1:52 PM=20
<DIV></DIV>
<DIV></DIV>&gt; To: Ron.Fuller@3x.com=20
<DIV></DIV>
<DIV></DIV>&gt; Cc: ccielab@groupstudy.com; NoOne Important; =
<DIV></DIV>
<DIV></DIV>&gt;nobody@groupstudy.com=20
<DIV></DIV>
<DIV></DIV>&gt; Subject: Re: CISCO FW IOS with allowing SSH to it from =
<DIV></DIV>
<DIV></DIV>&gt;outside=20
<DIV></DIV>
<DIV></DIV>&gt;
<DIV></DIV>
<DIV></DIV>&gt; Here is my full configs with IP addresses changed a bit. Tell m
e =
<DIV></DIV>
<DIV></DIV>&gt;what am I=20
<DIV></DIV>
<DIV></DIV>&gt; doing wrong?=20
<DIV></DIV>
<DIV></DIV>&gt;
<DIV></DIV>
<DIV></DIV>&gt; version 12.1=20
<DIV></DIV>
<DIV></DIV>&gt; no service single-slot-reload-enable=20
<DIV></DIV>
<DIV></DIV>&gt; service timestamps debug uptime=20
<DIV></DIV>
<DIV></DIV>&gt; service timestamps log uptime=20
<DIV></DIV>
<DIV></DIV>&gt; service password-encryption=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; hostname cisco=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; logging buffered 4096 debugging=20
<DIV></DIV>
<DIV></DIV>&gt; logging rate-limit console 10 except errors=20
<DIV></DIV>
<DIV></DIV>&gt; aaa new-model=20
<DIV></DIV>
<DIV></DIV>&gt; aaa authentication login default local=20
<DIV></DIV>
<DIV></DIV>&gt; enable password 7 045C1E031C32455A=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; username admin password 1234=20
<DIV></DIV>
<DIV></DIV>&gt; ip subnet-zero=20
<DIV></DIV>
<DIV></DIV>&gt; no ip source-route=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; no ip finger=20
<DIV></DIV>
<DIV></DIV>&gt; ip domain-name xyz.com=20
<DIV></DIV>
<DIV></DIV>&gt; ip name-server 1.1.1.1=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect max-incomplete high 1100=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect max-incomplete low 900=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect one-minute high 1100=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect one-minute low 900=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect name outbound tcp=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect name outbound udp=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect name outbound cuseeme=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect name outbound ftp=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect name outbound h323=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect name outbound rcmd=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect name outbound realaudio=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect name outbound smtp=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect name outbound streamworks=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect name outbound vdolive=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect name outbound sqlnet=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect name outbound tftp=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect name mail smtp=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; ip audit notify log=20
<DIV></DIV>
<DIV></DIV>&gt; ip audit po max-events 100=20
<DIV></DIV>
<DIV></DIV>&gt; ip ssh time-out 60=20
<DIV></DIV>
<DIV></DIV>&gt; ip ssh authentication-retries 3=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; call rsvp-sync=20
<DIV></DIV>
<DIV></DIV>&gt; cns event-service server=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; interface FastEthernet0/0=20
<DIV></DIV>
<DIV></DIV>&gt; description connection to Internal Network=20
<DIV></DIV>
<DIV></DIV>&gt; ip address 192.168.100.2 255.255.255.0=20
<DIV></DIV>
<DIV></DIV>&gt; ip nat inside=20
<DIV></DIV>
<DIV></DIV>&gt; duplex auto=20
<DIV></DIV>
<DIV></DIV>&gt; speed auto=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; interface FastEthernet0/1=20
<DIV></DIV>
<DIV></DIV>&gt; description Connection to Internet=20
<DIV></DIV>
<DIV></DIV>&gt; ip address 2.2.2.2 255.255.255.0=20
<DIV></DIV>
<DIV></DIV>&gt; ip access-group 101 in=20
<DIV></DIV>
<DIV></DIV>&gt; ip nat outside=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect outbound out=20
<DIV></DIV>
<DIV></DIV>&gt; ip inspect mail in=20
<DIV></DIV>
<DIV></DIV>&gt; duplex auto=20
<DIV></DIV>
<DIV></DIV>&gt; speed auto=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; ip kerberos source-interface any=20
<DIV></DIV>
<DIV></DIV>&gt; ip nat pool legal_ip 2.2.2.3 2.2.2.10 netmask 255.255.255.0=20
<DIV></DIV>
<DIV></DIV>&gt; ip nat inside source route-map nonat pool legal_ip overload=20
<DIV></DIV>
<DIV></DIV>&gt; ip nat inside source static 192.168.100.5 2.2.2.15=20
<DIV></DIV>
<DIV></DIV>&gt; ip classless=20
<DIV></DIV>
<DIV></DIV>&gt; ip route 0.0.0.0 0.0.0.0 2.2.2.1=20
<DIV></DIV>
<DIV></DIV>&gt; no ip http server=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; logging source-interface FastEthernet0/0=20
<DIV></DIV>
<DIV></DIV>&gt; logging 192.168.100.11=20
<DIV></DIV>
<DIV></DIV>&gt; access-list 101 permit tcp any host 2.2.2.15 eq smtp=20
<DIV></DIV>
<DIV></DIV>&gt; access-list 101 permit tcp any host 2.2.2.15 eq www=20
<DIV></DIV>
<DIV></DIV>&gt; access-list 101 permit tcp any host 2.2.2.15 eq 443=20
<DIV></DIV>
<DIV></DIV>&gt; access-list 101 permit tcp any host 2.2.2.15 eq pop3=20
<DIV></DIV>
<DIV></DIV>&gt; access-list 101 permit tcp any host 2.2.2.15 eq 143=20
<DIV></DIV>
<DIV></DIV>&gt; access-list 101 permit tcp any host 2.2.2.2 eq 22=20
<DIV></DIV>
<DIV></DIV>&gt; access-list 101 permit tcp any host 2.2.2.2 eq telnet=20
<DIV></DIV>
<DIV></DIV>&gt; access-list 101 deny tcp any any=20
<DIV></DIV>
<DIV></DIV>&gt; access-list 101 deny udp any any=20
<DIV></DIV>
<DIV></DIV>&gt; access-list 101 permit icmp any any echo-reply=20
<DIV></DIV>
<DIV></DIV>&gt; access-list 101 permit icmp any any time-exceeded=20
<DIV></DIV>
<DIV></DIV>&gt; access-list 101 permit icmp any any packet-too-big=20
<DIV></DIV>
<DIV></DIV>&gt; access-list 101 permit icmp any any traceroute=20
<DIV></DIV>
<DIV></DIV>&gt; access-list 101 permit icmp any any unreachable=20
<DIV></DIV>
<DIV></DIV>&gt; access-list 101 deny ip any any log=20
<DIV></DIV>
<DIV></DIV>&gt; access-list 160 permit ip any any=20
<DIV></DIV>
<DIV></DIV>&gt; no cdp run=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; route-map nonat permit 10=20
<DIV></DIV>
<DIV></DIV>&gt; match ip address 160=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; line con 0=20
<DIV></DIV>
<DIV></DIV>&gt; exec-timeout 0 0=20
<DIV></DIV>
<DIV></DIV>&gt; password 7 094F471A1A0A=20
<DIV></DIV>
<DIV></DIV>&gt; transport input none=20
<DIV></DIV>
<DIV></DIV>&gt; line aux 0=20
<DIV></DIV>
<DIV></DIV>&gt; password 7 070834495D1A1011=20
<DIV></DIV>
<DIV></DIV>&gt; line vty 0 4=20
<DIV></DIV>
<DIV></DIV>&gt; password 7 104D000A0618=20
<DIV></DIV>
<DIV></DIV>&gt; transport input telnet ssh=20
<DIV></DIV>
<DIV></DIV>&gt; !=20
<DIV></DIV>
<DIV></DIV>&gt; end=20
<DIV></DIV>
<DIV></DIV>&gt;
<DIV></DIV>



This archive was generated by hypermail 2.1.4 : Thu Jun 13 2002 - 10:28:48 GMT-3