Allow SSH and RDP Access to Private Resources

👍

Secure Access Packages and Feature Availability

Not all of the features described here are available to all Secure Access packages. Information about your current package is listed on the Admin > Licensing page. For more information, see Determine Your Current Package. If you encounter a feature here that you do not have access to, contact your sales representative for more information about your current package. See also, Cisco Secure Access Packages

You can allow Zero Trust Access to private resources using SSH and Microsoft's Remote Desktop Protocol (RDP).

Table of Contents

Clientless Browser-Based Zero Trust Access

Configuration overview: Browser-based zero trust access using SSH or RDP

To allow clientless browser-based Zero Trust Access to private resources using SSH or RDP:

  1. If you are using older SSH servers, see Details: Supported options for SSH.
  2. Configure your private resource:
    1. Allow access using the applicable protocol for the internally reachable address. See Add a Private Resource.

Note: The resource name will appear at the top of your users' SSH or RDP window.

  1. In the Private Resource, enable Zero-trust connections, then enable and configure browser-based connections.
  2. Follow the instructions for granting access to private destinations in Get Started With Private Access Rules.
  3. If your environment has a web proxy or firewall between end user browsers and the Secure Access cloud, you must allow websocket access on port 443 from your users' browsers to Secure Access.
  4. When you give users the applicable SSH or RDP credentials or private key for the resource, also provide the public URL for browser-based Zero Trust Access that you configured on the Private Resource page. Neither Secure Access nor the browser stores the credentials or private key.

Notes for browser-based SSH and RDP access

  • For limits on the number of user sessions, see the Service Connections section in Limitations and Range Limits.
  • The user experience will look like this:
SSH user experience
  • SSH and RDP users can paste text copied from their local machine by using the remote clipboard feature, shown in the image above.
  • RDP users will not be able to upload files or images.

Supported options for SSH access

Most SSH connections will be successful. If you are using older SSH servers, the following options are supported.

Key Exchange (KEX)Symmetric CipherMessage
Authentication
Code (MAC)
Server
Host Key
Algorithm
Compression SchemesAuthentication
diffie-hellman-group-exchange-sha256 [email protected]hmac-sha2-512ssh-ed25519zlibpassword
diffie-hellman-group1-sha1 [email protected]hmac-sha2-512-
[email protected]
ssh-ed25519-
cert-v01
@openssh.com
[email protected]public key
diffie-hellman-group14-sha1 hmac-sha2-256hmac-sha2-256ecdsa-sha2-
nistp521
nonen/a
diffie-hellman-group-exchange-sha1[email protected][email protected] ecdsa-sha2-nistp384n/an/a
n/ahmac-sha1hmac-sha1ecdsa-sha2-nistp256n/an/a
n/ahmac-sha1-96hmac-sha1-96ssh-rsan/an/a
n/ahmac-md5hmac-md5ssh-dssn/an/a
n/ahmac-md5-96hmac-md5-96n/an/an/a
n/ahmac-ripemd160
([email protected] )
hmac-ripemd160
([email protected] )
n/an/an/a

Client-Based Zero Trust Access

Client-based SSH and RDP access does not require special configurations. No user experience specific to Secure Access is required.

Manage Branch Connections < Allow SSH and RDP Access to Private Resources > Manage the Access Policy