SSH tunneling Control

SSH tunneling Control

15519
Created On 09/25/18 18:15 PM - Last Updated 07/13/19 00:43 AM


Resolution

The Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network. SSH allows tunneling, which can be used to subvert firewalls and breach security policies. Users can "sneak through" a firewall by hiding applications inside a SSH tunnel. With SSH Proxy, PAN-OS firewalls can be configured to decrypt SSH traffic and detect when SSH port forwarding is used. The firewall can then be configured to block the SSH tunneling traffic with a security policy. As a result, this will deny the applications that are tunneled inside SSH.

Note: This feature does not provide any control of apps or threats within the tunnel.



Additional Information
For a video demonstration of the SSH Proxy feature, refer to the Tutorial: SSH Decryption

Attachments
Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClOPCA0&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Attachments
Choose Language