Firewall – ASA Firewall Can PING cannot SSH to switch on different interface

access-controlcisco-asafirewall

There are three interfaces, TRUST (security level 100), UNTRUST (security level 0), and DMZ (security level 50).

I am on a network coming into the firewall via the UNTRUST interface. The switch I am able to use ICMP with but not SSH to (timeout) is connected via the DMZ interface. There are three rules which each included the same service group (including icmp, tcp/ssh, udp/tftp, tcp/telnet, udp/syslog). These rules are applied as follows:

DMZ Interface (incoming)
    DMZ_network any IP permit

TRUST Interface (incoming)
    DMZ_switch my_laptop service_group permit

UNTRUST Interface (incoming)
    my_laptop DMZ_switch service_group permit

So I am able to ICMP, and I see increment on the rules that have been applied, but I receive connection-timeout for SSH connection attempts. I've spent too much time hitting my head on the proverbial wall to not reach out for an assist here. I appreciate anyone and everyone who takes time to read or answer this question.

Regards,
lzer

Best Answer

Considering that your ruleset is correct... Have you checked on the switch side? There might be an access-class configured on your vty.

p.s. you may want to use packet-tracer on ASA to check if traffic would be permited or just check the logbuffer via CLI/ASDM to see what is really going on.

Let me know if you need any help.