<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 3950 - Host Access doesn't work for SSH in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266424#M52631</link>
    <description>&lt;P&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="0:2"&gt;in&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="3:10"&gt;fact&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="14:1"&gt;I&lt;/SPAN&gt;&lt;SPAN&gt; didn&lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="16:2"&gt;'t&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="19:10"&gt;test&lt;/SPAN&gt;&lt;SPAN&gt; the &lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="30:11"&gt;connection&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="43:6"&gt;because&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="50:3"&gt;I&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="54:5"&gt;wanted&lt;/SPAN&gt;&lt;SPAN&gt; to &lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="67:7"&gt;make&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="87:4"&gt;port&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="92:2"&gt;22&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="75:11"&gt;inaccessible&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="95:2"&gt;from&lt;/SPAN&gt;&lt;SPAN&gt; the &lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="98:7"&gt;external&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="106:4"&gt;network&lt;/SPAN&gt;&lt;SPAN&gt; altogether&lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="110:1"&gt;.&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="112:6"&gt;Now&lt;/SPAN&gt;&lt;SPAN&gt; I &lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="122:4"&gt;see&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="128:3"&gt;that&lt;/SPAN&gt;&lt;SPAN&gt; the &lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="132:4"&gt;Host&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="137:6"&gt;Access&lt;/SPAN&gt;&lt;SPAN&gt; is &lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="144:12"&gt;working&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="161:4"&gt;properly and there is &lt;STRONG&gt;no any way to disable Port 22 on external Interface without Firewall&lt;/STRONG&gt;?&amp;nbsp;&lt;SPAN&gt;Is &lt;/SPAN&gt;it still secure enough?&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="authorized use only.png" style="width: 427px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32609i214DC7BE8E9CB5E3/image-size/large?v=v2&amp;amp;px=999" role="button" title="authorized use only.png" alt="authorized use only.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 03 Jan 2026 12:19:19 GMT</pubDate>
    <dc:creator>Exonix</dc:creator>
    <dc:date>2026-01-03T12:19:19Z</dc:date>
    <item>
      <title>3950 - Host Access doesn't work for SSH</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266361#M52605</link>
      <description>&lt;P&gt;Hello everyone and Happy New 2026 Year!&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":clinking_glasses:"&gt;🥂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I've got a new toy - CheckPoint 3950 to replace a buggy 1900...&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;This is Check Point's software version R82.10 - Build 767
kernel: R82.10 - Build 768&lt;/LI-CODE&gt;
&lt;P&gt;Before connecting the gateway to the cloud management server, I want to restrict access to the firewall from the Internet. To do this, I use "System Management - Host Access". But this works only for the Web-Access and doesn't work for SSH-Access. I found the following in the /etc/ssh/sshd_config:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;#  Generated by /bin/sshd_template_xlate on Fri Jan  2 14:32:16 2026
#
#  DO NOT EDIT

Match address 192.168.0.0/24
PermitRootLogin yes
PasswordAuthentication yes
Match all

UseDNS no
PasswordAuthentication no
PermitRootLogin no&lt;/LI-CODE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="0:3"&gt;How&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="6:4"&gt;can&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="4:1"&gt;I&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="11:9"&gt;make&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="21:1"&gt;"&lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="31:5"&gt;Host&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="22:8"&gt;Access&lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="36:1"&gt;"&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="38:8"&gt;work&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="49:3"&gt;for&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="53:3"&gt;SSH&lt;/SPAN&gt; as well&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="56:1"&gt;?&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thank you in advance!&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jan 2026 14:35:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266361#M52605</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2026-01-02T14:35:13Z</dc:date>
    </item>
    <item>
      <title>Re: 3950 - Host Access doesn't work for SSH</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266365#M52606</link>
      <description>&lt;P&gt;Config should be like:&lt;/P&gt;
&lt;P&gt;add allowed-client host ipv4-address 10.1.1.1&lt;BR /&gt;add allowed-client network ipv4-address 10.0.0.0 mask-length 24&lt;BR /&gt;set web ssl3-enabled off&lt;BR /&gt;set web daemon-enable on&lt;/P&gt;
&lt;P&gt;please also share&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;CODE&gt;[Expert@HostName]# cat /etc/hosts.allow&lt;/CODE&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;CODE&gt;[Expert@HostName]# cat /etc/hosts.deny&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;STRONG&gt;ls -l /etc/hosts.*&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jan 2026 15:02:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266365#M52606</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2026-01-02T15:02:54Z</dc:date>
    </item>
    <item>
      <title>Re: 3950 - Host Access doesn't work for SSH</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266373#M52609</link>
      <description>&lt;P&gt;Can you please send output of /etc/ssh/sshd_config file?&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jan 2026 15:38:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266373#M52609</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-02T15:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: 3950 - Host Access doesn't work for SSH</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266375#M52610</link>
      <description>&lt;LI-CODE lang="markup"&gt;#ls -l /etc/hosts.*
-rw-r--r-- 1 admin root 9 Dec 23 22:40 /etc/hosts.allow
-rw-r--r-- 1 admin root 9 Dec 23 22:40 /etc/hosts.deny
# cat /etc/hosts.allow
ALL: ALL
# cat /etc/hosts.deny
ALL: ALL
&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 02 Jan 2026 15:44:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266375#M52610</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2026-01-02T15:44:18Z</dc:date>
    </item>
    <item>
      <title>Re: 3950 - Host Access doesn't work for SSH</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266376#M52611</link>
      <description>&lt;LI-CODE lang="markup"&gt;cat /etc/ssh/sshd_config

#  This file was AUTOMATICALLY GENERATED
#  Generated by /bin/sshd_template_xlate on Fri Jan  2 14:32:16 2026
#
#  DO NOT EDIT
#
#       $OpenBSD: sshd_config,v 1.104 2021/07/02 05:11:21 dtucker Exp $

# This is the sshd server system-wide configuration file.  See
# sshd_config(5) for more information.

# This sshd was compiled with PATH=/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin

# The strategy used for options in the default sshd_config shipped with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented.  Uncommented options override the
# default value.

# To modify the system-wide sshd configuration, create a  *.conf  file under
#  /etc/ssh/sshd_config.d/  which will be automatically included below
#Include /etc/ssh/sshd_config.d/*.conf

# If you want to change the port on a SELinux system, you have to tell
# SELinux about this change.
# semanage port -a -t ssh_port_t -p tcp #PORTNUMBER
#
#Port 22
#AddressFamily any
#ListenAddress 0.0.0.0
#ListenAddress ::

HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
HostKey /etc/ssh/ssh_host_ecdsa_key
HostKey /etc/ssh/ssh_host_ed25519_key

#RekeyLimit default none

# Logging
#SyslogFacility AUTH
#LogLevel INFO

# Authentication:

#LoginGraceTime 2m
#PermitRootLogin prohibit-password
StrictModes yes
#MaxAuthTries 6
#MaxSessions 10

#PubkeyAuthentication yes

# The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2
# but this is overridden so installations will only check .ssh/authorized_keys
AuthorizedKeysFile      .ssh/authorized_keys

#AuthorizedPrincipalsFile none

#AuthorizedKeysCommand none
#AuthorizedKeysCommandUser nobody

# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
#HostbasedAuthentication no
# Change to yes if you don't trust ~/.ssh/known_hosts for
# HostbasedAuthentication
IgnoreUserKnownHosts yes
# Don't read the user's ~/.rhosts and ~/.shosts files
IgnoreRhosts yes

# To disable tunneled clear text passwords, change to no here!
#PermitEmptyPasswords no

# Change to no to disable s/key passwords
#ChallengeResponseAuthentication yes
ChallengeResponseAuthentication no

# Change to no to disable s/key passwords
#KbdInteractiveAuthentication yes

# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
#KerberosGetAFSToken no
#KerberosUseKuserok yes

# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCredentials yes
#GSSAPIStrictAcceptorCheck yes
#GSSAPIKeyExchange no
#GSSAPIEnablek5users no

# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the KbdInteractiveAuthentication and
# PasswordAuthentication.  Depending on your PAM configuration,
# PAM authentication via KbdInteractiveAuthentication may bypass
# the setting of "PermitRootLogin without-password".
# If you just want the PAM account and session checks to run without
# PAM authentication, then enable this but set PasswordAuthentication
# and KbdInteractiveAuthentication to 'no'.
# WARNING: 'UsePAM no' is not supported in Fedora and may cause several
# problems.
UsePAM yes
KbdInteractiveAuthentication no

AllowAgentForwarding no
AllowTcpForwarding no
#GatewayPorts no
X11Forwarding no
#X11DisplayOffset 10
#X11UseLocalhost yes
#PermitTTY yes
PrintMotd yes
#PrintLastLog yes
TCPKeepAlive yes
#PermitUserEnvironment no
#Compression delayed
#ClientAliveCountMax 3
#PidFile /var/run/sshd.pid
#MaxStartups 10:30:100
#PermitTunnel no
#ChrootDirectory none
#VersionAddendum none

# no default banner path
Banner /etc/issue

# override default of no subsystems
Subsystem       sftp    /usr/libexec/openssh/sftp-server

DenyUsers root shutdown halt nobody ntp pcap rpm
# ckp - CR00596011
#AllowGroups root

# Example of overriding settings on a per-user basis
#Match User anoncvs
#       X11Forwarding no
#       AllowTcpForwarding no
#       PermitTTY no
#       ForceCommand cvs server

Match address 192.168.0.0/24
PermitRootLogin yes
PasswordAuthentication yes
Match all

Ciphers aes128-ctr,aes192-ctr,aes256-ctr "and many others"
UseDNS no
PasswordAuthentication no
PermitRootLogin no
ClientAliveInterval 0
logingracetime 120
&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 02 Jan 2026 15:46:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266376#M52611</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2026-01-02T15:46:46Z</dc:date>
    </item>
    <item>
      <title>Re: 3950 - Host Access doesn't work for SSH</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266377#M52612</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/65443"&gt;@Exonix&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the context, this is what mine looks like in the lab (R82 jumbo 60)&lt;/P&gt;
&lt;P&gt;[Expert@CP-GW:0]# more sshd_config&lt;BR /&gt;# This file was AUTOMATICALLY GENERATED&lt;BR /&gt;# Generated by /bin/sshd_template_xlate on Mon Dec 29 09:05:05 2025&lt;BR /&gt;#&lt;BR /&gt;# DO NOT EDIT&lt;BR /&gt;#&lt;BR /&gt;# $OpenBSD: sshd_config,v 1.103 2018/04/09 20:41:22 tj Exp $&lt;/P&gt;
&lt;P&gt;# This is the sshd server system-wide configuration file. See&lt;BR /&gt;# sshd_config(5) for more information.&lt;/P&gt;
&lt;P&gt;# This sshd was compiled with PATH=/usr/local/bin:/usr/bin:/usr/local/sbin:/us&lt;BR /&gt;r/sbin&lt;/P&gt;
&lt;P&gt;# The strategy used for options in the default sshd_config shipped with&lt;BR /&gt;# OpenSSH is to specify options with their default value where&lt;BR /&gt;# possible, but leave them commented. Uncommented options override the&lt;BR /&gt;# default value.&lt;/P&gt;
&lt;P&gt;# If you want to change the port on a SELinux system, you have to tell&lt;BR /&gt;# SELinux about this change.&lt;BR /&gt;# semanage port -a -t ssh_port_t -p tcp #PORTNUMBER&lt;BR /&gt;#&lt;BR /&gt;#Port 22&lt;BR /&gt;#AddressFamily any&lt;BR /&gt;#ListenAddress 0.0.0.0&lt;BR /&gt;#ListenAddress ::&lt;/P&gt;
&lt;P&gt;HostKey /etc/ssh/ssh_host_rsa_key&lt;BR /&gt;HostKey /etc/ssh/ssh_host_dsa_key&lt;BR /&gt;HostKey /etc/ssh/ssh_host_ecdsa_key&lt;BR /&gt;HostKey /etc/ssh/ssh_host_ed25519_key&lt;/P&gt;
&lt;P&gt;#RekeyLimit default none&lt;/P&gt;
&lt;P&gt;# System-wide Crypto policy:&lt;BR /&gt;# This system is following system-wide crypto policy. The changes to&lt;BR /&gt;# effect here. They will be overridden by command-line options passed on&lt;BR /&gt;# the server start up.&lt;BR /&gt;# To opt out, uncomment a line with redefinition of CRYPTO_POLICY=&lt;BR /&gt;# variable in /etc/sysconfig/sshd to overwrite the policy.&lt;BR /&gt;# For more information, see manual page for update-crypto-policies(8).&lt;/P&gt;
&lt;P&gt;# Logging&lt;BR /&gt;#SyslogFacility AUTH&lt;BR /&gt;SyslogFacility AUTHPRIV&lt;BR /&gt;#LogLevel INFO&lt;/P&gt;
&lt;P&gt;# Authentication:&lt;/P&gt;
&lt;P&gt;#LoginGraceTime 2m&lt;BR /&gt;StrictModes yes&lt;BR /&gt;#MaxAuthTries 6&lt;BR /&gt;#MaxSessions 10&lt;/P&gt;
&lt;P&gt;#PubkeyAuthentication yes&lt;/P&gt;
&lt;P&gt;# The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2&lt;BR /&gt;# but this is overridden so installations will only check .ssh/authorized_keys&lt;BR /&gt;AuthorizedKeysFile .ssh/authorized_keys&lt;/P&gt;
&lt;P&gt;#AuthorizedPrincipalsFile none&lt;/P&gt;
&lt;P&gt;#AuthorizedKeysCommand none&lt;BR /&gt;#AuthorizedKeysCommandUser nobody&lt;/P&gt;
&lt;P&gt;# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts&lt;BR /&gt;#HostbasedAuthentication no&lt;BR /&gt;# Change to yes if you don't trust ~/.ssh/known_hosts for&lt;BR /&gt;# HostbasedAuthentication&lt;BR /&gt;IgnoreUserKnownHosts yes&lt;BR /&gt;# Don't read the user's ~/.rhosts and ~/.shosts files&lt;BR /&gt;IgnoreRhosts yes&lt;/P&gt;
&lt;P&gt;# To disable tunneled clear text passwords, change to no here!&lt;BR /&gt;#PasswordAuthentication yes&lt;BR /&gt;#PermitEmptyPasswords no&lt;/P&gt;
&lt;P&gt;# Change to no to disable s/key passwords&lt;BR /&gt;#ChallengeResponseAuthentication yes&lt;BR /&gt;ChallengeResponseAuthentication no&lt;/P&gt;
&lt;P&gt;# Kerberos options&lt;BR /&gt;#KerberosAuthentication no&lt;BR /&gt;#KerberosOrLocalPasswd yes&lt;BR /&gt;#KerberosTicketCleanup yes&lt;BR /&gt;#KerberosGetAFSToken no&lt;BR /&gt;#KerberosUseKuserok yes&lt;/P&gt;
&lt;P&gt;# GSSAPI options&lt;BR /&gt;##GSSAPIAuthentication yes&lt;BR /&gt;#GSSAPICleanupCredentials no&lt;BR /&gt;##GSSAPICleanupCredentials yes&lt;BR /&gt;#GSSAPIStrictAcceptorCheck yes&lt;BR /&gt;#GSSAPIKeyExchange no&lt;BR /&gt;#GSSAPIEnablek5users no&lt;/P&gt;
&lt;P&gt;# Set this to 'yes' to enable PAM authentication, account processing,&lt;BR /&gt;# and session processing. If this is enabled, PAM authentication will&lt;BR /&gt;# be allowed through the ChallengeResponseAuthentication and&lt;BR /&gt;# PasswordAuthentication. Depending on your PAM configuration,&lt;BR /&gt;# PAM authentication via ChallengeResponseAuthentication may bypass&lt;BR /&gt;# the setting of "PermitRootLogin without-password".&lt;BR /&gt;# If you just want the PAM account and session checks to run without&lt;BR /&gt;# PAM authentication, then enable this but set PasswordAuthentication&lt;BR /&gt;# and ChallengeResponseAuthentication to 'no'.&lt;BR /&gt;# WARNING: 'UsePAM no' is not supported in Fedora and may cause several&lt;BR /&gt;# problems.&lt;BR /&gt;UsePAM yes&lt;/P&gt;
&lt;P&gt;AllowAgentForwarding no&lt;BR /&gt;AllowTcpForwarding no&lt;BR /&gt;#GatewayPorts no&lt;BR /&gt;X11Forwarding no&lt;BR /&gt;#X11DisplayOffset 10&lt;BR /&gt;#X11UseLocalhost yes&lt;BR /&gt;#PermitTTY yes&lt;/P&gt;
&lt;P&gt;# It is recommended to use pam_motd in /etc/pam.d/sshd instead of PrintMotd,&lt;BR /&gt;# as it is more configurable and versatile than the built-in version.&lt;BR /&gt;PrintMotd yes&lt;/P&gt;
&lt;P&gt;#PrintLastLog yes&lt;BR /&gt;TCPKeepAlive yes&lt;BR /&gt;#PermitUserEnvironment no&lt;BR /&gt;#Compression delayed&lt;BR /&gt;#ClientAliveCountMax 3&lt;BR /&gt;#ShowPatchLevel no&lt;BR /&gt;#PidFile /var/run/sshd.pid&lt;BR /&gt;MaxStartups 10&lt;BR /&gt;#PermitTunnel no&lt;BR /&gt;#ChrootDirectory none&lt;BR /&gt;#VersionAddendum none&lt;/P&gt;
&lt;P&gt;# no default banner path&lt;BR /&gt;Banner /etc/issue&lt;/P&gt;
&lt;P&gt;# Accept locale-related environment variables&lt;BR /&gt;AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES&lt;BR /&gt;AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT&lt;BR /&gt;AcceptEnv LC_IDENTIFICATION LC_ALL LANGUAGE&lt;BR /&gt;AcceptEnv XMODIFIERS&lt;/P&gt;
&lt;P&gt;# override default of no subsystems&lt;BR /&gt;Subsystem sftp /usr/libexec/openssh/sftp-server&lt;/P&gt;
&lt;P&gt;DenyUsers root shutdown halt nobody ntp pcap rpm&lt;BR /&gt;# ckp - CR00596011&lt;BR /&gt;#AllowGroups root&lt;/P&gt;
&lt;P&gt;# Example of overriding settings on a per-user basis&lt;BR /&gt;#Match User anoncvs&lt;BR /&gt;# X11Forwarding no&lt;BR /&gt;# AllowTcpForwarding no&lt;BR /&gt;# PermitTTY no&lt;BR /&gt;# ForceCommand cvs server&lt;/P&gt;
&lt;P&gt;Match address 0::0/0,0.0.0.0/0&lt;BR /&gt;PermitRootLogin yes&lt;BR /&gt;PasswordAuthentication yes&lt;BR /&gt;Match all&lt;/P&gt;
&lt;P&gt;Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@ope&lt;BR /&gt;nssh.com&lt;BR /&gt;Macs umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openss&lt;BR /&gt;h.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.&lt;BR /&gt;com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;BR /&gt;KexAlgorithms curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp25&lt;BR /&gt;6,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,d&lt;BR /&gt;iffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-grou&lt;BR /&gt;p14-sha256,diffie-hellman-group14-sha1&lt;BR /&gt;hostkeyalgorithms ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384&lt;BR /&gt;-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cer&lt;BR /&gt;t-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@open&lt;BR /&gt;ssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,e&lt;BR /&gt;cdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa&lt;BR /&gt;UseDNS no&lt;BR /&gt;PasswordAuthentication no&lt;BR /&gt;PermitRootLogin no&lt;BR /&gt;ClientAliveInterval 0&lt;BR /&gt;[Expert@CP-GW:0]#&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jan 2026 15:47:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266377#M52612</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-02T15:47:09Z</dc:date>
    </item>
    <item>
      <title>Re: 3950 - Host Access doesn't work for SSH</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266378#M52613</link>
      <description>&lt;P&gt;You just want to restrict to below?&lt;/P&gt;
&lt;PRE class="lia-code-sample  language-markup"&gt;&lt;CODE&gt;
Match address 192.168.0.0/24
PermitRootLogin yes
PasswordAuthentication yes
Match all&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 02 Jan 2026 15:49:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266378#M52613</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-02T15:49:32Z</dc:date>
    </item>
    <item>
      <title>Re: 3950 - Host Access doesn't work for SSH</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266395#M52619</link>
      <description>&lt;P&gt;This is not good, show me the relevant GAIA config. Or try to change it to any and then the ACL ip.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jan 2026 18:48:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266395#M52619</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2026-01-02T18:48:56Z</dc:date>
    </item>
    <item>
      <title>Re: 3950 - Host Access doesn't work for SSH</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266396#M52620</link>
      <description>&lt;P&gt;I really believe Lesley that what you gave in the beginning is perfect.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jan 2026 18:51:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266396#M52620</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-02T18:51:13Z</dc:date>
    </item>
    <item>
      <title>Re: 3950 - Host Access doesn't work for SSH</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266416#M52625</link>
      <description>&lt;P&gt;Can we start with what the actual GAiA config looks like?&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jan 2026 02:20:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266416#M52625</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2026-01-03T02:20:02Z</dc:date>
    </item>
    <item>
      <title>Re: 3950 - Host Access doesn't work for SSH</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266418#M52626</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Host Access.png" style="width: 920px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32608i0FF9B112F83B10F4/image-size/large?v=v2&amp;amp;px=999" role="button" title="Host Access.png" alt="Host Access.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/73547"&gt;@Lesley&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;This is not good, show me the relevant GAIA config. Or try to change it to any and then the ACL ip.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;do you mean like this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;/etc/hosts.allow
ALL: 192.168.0.0/24&lt;/LI-CODE&gt;</description>
      <pubDate>Sat, 03 Jan 2026 10:12:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266418#M52626</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2026-01-03T10:12:36Z</dc:date>
    </item>
    <item>
      <title>Re: 3950 - Host Access doesn't work for SSH</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266419#M52627</link>
      <description>&lt;P&gt;I want to allow only one internal network - so, restrict all, except this local network behind a local interface. Now SSH is open for external Interfaces too - I don't want this...&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jan 2026 10:17:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266419#M52627</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2026-01-03T10:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: 3950 - Host Access doesn't work for SSH</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266420#M52628</link>
      <description>&lt;P&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="0:5"&gt;which&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="13:5"&gt;part&lt;/SPAN&gt;&lt;SPAN&gt; of the &lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="27:4"&gt;Gaia&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="19:7"&gt;config&lt;/SPAN&gt;&lt;SPAN&gt; is &lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="32:5"&gt;needed&lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="37:1"&gt;?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jan 2026 10:15:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266420#M52628</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2026-01-03T10:15:40Z</dc:date>
    </item>
    <item>
      <title>Re: 3950 - Host Access doesn't work for SSH</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266421#M52629</link>
      <description>&lt;P&gt;This is good config, network defined and any removed. Did this change update the files below or they remain default?&lt;/P&gt;
&lt;PRE class="lia-code-sample  language-markup"&gt;&lt;CODE&gt;# cat /etc/hosts.allow
ALL: ALL
# cat /etc/hosts.deny
ALL: ALL&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;If you start SSH from outside the internal network what happens? Do you get loging prompt and then get kicked out? You should also make a firewall rule that blocks and allow traffic to the gateway itself (turn off implied rule for this for more control)&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jan 2026 11:48:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266421#M52629</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2026-01-03T11:48:26Z</dc:date>
    </item>
    <item>
      <title>Re: 3950 - Host Access doesn't work for SSH</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266424#M52631</link>
      <description>&lt;P&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="0:2"&gt;in&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="3:10"&gt;fact&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="14:1"&gt;I&lt;/SPAN&gt;&lt;SPAN&gt; didn&lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="16:2"&gt;'t&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="19:10"&gt;test&lt;/SPAN&gt;&lt;SPAN&gt; the &lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="30:11"&gt;connection&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="43:6"&gt;because&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="50:3"&gt;I&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="54:5"&gt;wanted&lt;/SPAN&gt;&lt;SPAN&gt; to &lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="67:7"&gt;make&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="87:4"&gt;port&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="92:2"&gt;22&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="75:11"&gt;inaccessible&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="95:2"&gt;from&lt;/SPAN&gt;&lt;SPAN&gt; the &lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="98:7"&gt;external&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="106:4"&gt;network&lt;/SPAN&gt;&lt;SPAN&gt; altogether&lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="110:1"&gt;.&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="112:6"&gt;Now&lt;/SPAN&gt;&lt;SPAN&gt; I &lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="122:4"&gt;see&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="128:3"&gt;that&lt;/SPAN&gt;&lt;SPAN&gt; the &lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="132:4"&gt;Host&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="137:6"&gt;Access&lt;/SPAN&gt;&lt;SPAN&gt; is &lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="144:12"&gt;working&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="161:4"&gt;properly and there is &lt;STRONG&gt;no any way to disable Port 22 on external Interface without Firewall&lt;/STRONG&gt;?&amp;nbsp;&lt;SPAN&gt;Is &lt;/SPAN&gt;it still secure enough?&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="authorized use only.png" style="width: 427px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32609i214DC7BE8E9CB5E3/image-size/large?v=v2&amp;amp;px=999" role="button" title="authorized use only.png" alt="authorized use only.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jan 2026 12:19:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266424#M52631</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2026-01-03T12:19:19Z</dc:date>
    </item>
    <item>
      <title>Re: 3950 - Host Access doesn't work for SSH</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266425#M52632</link>
      <description>&lt;P&gt;Looks the same like my lab, next step is to make firewall rule to block ssh to the gateway itself and only allow the internal subnet.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jan 2026 13:02:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266425#M52632</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2026-01-03T13:02:06Z</dc:date>
    </item>
    <item>
      <title>Re: 3950 - Host Access doesn't work for SSH</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266426#M52633</link>
      <description>&lt;P&gt;I can't create any rules yet, because the firewall isn't connected to the could management server. But is such security enough for now?&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jan 2026 13:07:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266426#M52633</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2026-01-03T13:07:25Z</dc:date>
    </item>
    <item>
      <title>Re: 3950 - Host Access doesn't work for SSH</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266427#M52634</link>
      <description>&lt;P&gt;Should be, yes.&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jan 2026 13:10:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3950-Host-Access-doesn-t-work-for-SSH/m-p/266427#M52634</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-03T13:10:39Z</dc:date>
    </item>
  </channel>
</rss>

