I have a USG60W that is acting strange with SSH traffic. It is my understanding by default the firewall will allow all outbound traffic on all ports. All other traffic to the Internet appears to be working, WWWW and HTTPS for example, just not SSH. I have a backup device behind the firewall that uses SSH to upload local backups to offsite servers. However these uploads are failing and I can't even SSH to some other remote devices. I can SSH directly into the USG60W though. I tried creating an explicit firewall rule to allow SSH traffic from LAN2 to WAN for any IP address to any destination and I can see the rule is getting applied to outbound SSH traffic. I also created another explicit policy allowing SSH traffic from WAN to LAN2 but it isn't logging any matching traffic. Any ideas as to what could be happening?
#Biz_Security_Feb_2019
SSH Traffic Issue
HiddenSystem346
Posts: 2 Freshman Member
0
All Replies
-
Since the backup device is behind USG60W, if you want to remote access is backup device, NAT rule need to be created. Select Virtual server, Incoming interface: wan1, External IP:(wan1 IP),Interface IP: Backup device IP, press ok.
Another thing to see it is firewall block ssh traffic or not, try to disable firewall and upload the backup to offsite servers.
0 -
Thanks for the suggestion. After further investigation I believe the issue is with the ISP in this case as bypassing the firewall yielded the same results.0
Categories
- All Categories
- 414 Beta Program
- 2.3K Nebula
- 132 Nebula Ideas
- 92 Nebula Status and Incidents
- 5.4K Security
- 181 USG FLEX H Series
- 258 Security Ideas
- 1.4K Switch
- 71 Switch Ideas
- 1K Wireless
- 37 Wireless Ideas
- 6.2K Consumer Product
- 236 Service & License
- 372 News and Release
- 79 Security Advisories
- 24 Education Center
- 5 [Campaign] Zyxel Network Detective
- 2.9K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 80 About Community
- 69 Security Highlight