Hello. We are implementing a test environment currently, so new gateways and a new policy... and I'm running into a traffic Reject I haven't encountered before. The Reject shows as Blade: Firewall, and has no matching rule number, and for message information it says "SSH version 1.x is not allowed."
I have Googled for this specific message, and found sk30470.. unfortunately the solution provided in sk30470 doesn't seem to work for me!
The traffic being Rejected by Check Point is for a Juniper Networks EX-series network switch talking to "MIST Wired Assurance" cloud management platform on TCP/2200.
The Check Point gateway is Rejecting this traffic because "SSH version 1.x is not allowed." Ok, that is not ideal if MIST is truly using that protocol version, and that's something I can bring up with that vendor.. but in the mean time, I really have to be able to allow this traffic on the Gateway. The problem is, I cannot figure out how! The article sk30470 says to use the 'ssh' service object to match all versions of ssh, but this traffic is using a custom port 2200. So.. how do I work around this issue? When I Created a custom service object to match TCP/2200, I only see ssh2 in the drop down for protocols.
Is this something I have to make an exception for in Inspection Settings? In the past I have done an exception like "Non-HTTPS Traffic over an HTTPS port" but there doesn't seem to be a similar option for SSH version 1.x is not allowed."
Any help would be appreciated. Since this for a test gateway I do not feel it warrants a TAC case, but I haven't been able to figure this out yet...