SSH Inspection

This is the section where SSH traffic passing through the Firewall is set to access options with different protocols.

image

Note: IP addresses are given as examples.

  • Only SSH servers connected with password auth can be set. (Public Key should not be.) `

  • A Shell connection must always be made for the server/client to be connected regardless of the options selected in the rules.`

  • After pressing the Add button, the operations are performed in the pop-up window.

image

image

FIELD DESCRIPTION
Status Active or passive status is selected.
Source Address Enter the source address to which the rule will be applied.
Destination Address Enter the destination address to which the rule will be applied.
Destination Port The destination port(s) to which the rule will be applied are written.
Port Forwarding Allow or Block options are selected for Port Forwarding.
SSH File Transfer (SFTP) Allow or Block is selected for SSH File Transfer (SFTP).
SSH Terminal Activity Logging Active is selected if SSH Terminal activity is to be logged.

ePati Cyber Security Co.

Mersin Üniversitesi Çiftlikköy Kampüsü
Teknopark İdari Binası Kat:4 No: 411
Posta Kodu: 33343
Yenişehir / Mersin / TURKEY

Web: www.epati.com.tr
e-Mail: info@epati.com.tr
Tel: +90 324 361 02 33
Fax: +90 324 361 02 39