It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

This Firmware Version Is End-Of-Support

Documentation for this product is no longer updated. Please see End-of-Support for CloudGen Firewall Firmware for further information on our EoS policy.

SSH Proxy

  • Last updated on

The SSH Proxy service of the CloudGen Firewall allows users to regulate SSH connections. Users can establish SSH sessions over the firewall and connect to remote servers to perform administrative tasks without having to remember login credentials and IP addresses at the target. The SSH Proxy service supports a range of useful features, like user authentication at the gateway via external authentication schemes, public key authentication at the target system, permission profile assignment, and DoS protection by configurable login grace-time and session limits. The SSH Proxy prevents firewall policy evasion by preventing protocol tunneling inside SSH connections. However, X11 connection forwarding is allowed. Unlike the Forwarding Firewall, multiple instances of the SSH Proxy can be run at the same time. The default username of each SSH Proxy instance is set to 'sshprx'. Therefore, if you run multiple instances, a unique username and user ID must be configured for each SSH Proxy instance.

Implementing the SSH Proxy Service on the CloudGen Firewall


SSH Proxy Configuration

The SSH Proxy service provides configurable SSH protocol support for accessing target systems (v2-only, or v2 and v1). You can specify the port and a local source IP address or hostname (to use policy routing) from which remote systems can be accessed. Target access lists allow definition of target hosts for selection. Additionally, you can configure the reverse DNS lookup behavior of the server for accessing clients, specify client and server alive times, and specify compression and session limits and timeouts.

For more information on how to configure the SSH Proxy service on the firewall, see How to Configure the SSH Proxy.

Authentication and Access Control

The SSH Proxy service supports user authentication via all configurable and meaningful authentication schemes (not OCSP) with username and password combination. No local user database is required. Access is configurable based on group policies, and individual known_hosts files are created for each user. The SSH Proxy service allows you to create default and custom permission profiles where you can specify monitoring settings such as optional session and activity tracing for certain users (console output cloning to file), access control settings based on policies, and configurable network permissions and restrictions. Agent Forwarding allows users to cascade connections to other hosts. However, this feature should be used with caution for security reasons. 

For more information on how to create permission profiles, see How to Configure Permission Profiles.


In the SSH Proxy service configuration, you can specify the server and client log level (ssh-client) according to your company´s requirements. Log entries are accessible under the Logs tab.

Last updated on