Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Announcements

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. If you'd prefer to explore, try our test area to get started. And see here for current known issues.

New Member

ASA5520

hello,

I'm having trouble with a security policy rule that is denying outbound connections. I am trying to allow outbound SSH connections to specific IP addresses. Therefore, I added a rule on the inside incoming interface that allows tcp source 192.168.0.0/24 dest ip-group tcp-service group. The ip-group consists of 3 IP addresses of servers. The TCP service group consists of tcp ports 902, 9999, ftp, ftp-data, and ssh. 902, 9999, ftp, ftp-data work fine, but the SSH does not work. I get a message in the log deny tcp src 192.168.0.x to x.x.x.x:22 on the internal access list.

I have a NAT rule for these connections, but it looks like the firewall denies it before the NAT rule takes affect.

Let me know if anyone has any suggestions. Thanks,

1 ACCEPTED SOLUTION

Accepted Solutions

Re: ASA5520

Is there a Deny farther up the ACL? Any hit counts on the ACL for SSH? Can you post the entire log message (minus the IPs)?

2 REPLIES

Re: ASA5520

Is there a Deny farther up the ACL? Any hit counts on the ACL for SSH? Can you post the entire log message (minus the IPs)?

New Member

Re: ASA5520

thanks, you were right, there was something farther up the ACL that was denying thanks!

103
Views
0
Helpful
2
Replies