answersLogoWhite

0


Best Answer

While any unassigned and high level port could be used for SSH it is typically assigned to port 22 on a standard setup.

You would need to set up forwarding on that port on your router to the internal IP address in question.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

13y ago

Which firewall port number or number combination must be open in order to remotely access a network device using SSH?

20/2122232580

This answer is:
User Avatar

User Avatar

Wiki User

12y ago

22

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which firewall port number combination must be open in order to remotely access a network device using SSH?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

It protects a computer network from unauthorized access it may be a hardware devices or software programs or a combination of the two?

That sounds like a firewall.


What is prevent the unauthorized network access?

firewall


Which access using to prevented Unauthorized network?

Firewall


How do you access vmware Linux from windows7 using putty?

If you want to access it remotely you will have to create rules in firewall allowing incoming connections at a specific port. If you have configured just bridged connection, only firewall rules have to be modified. If you run NAT configuration you will have to modify firewall rules as well create portforwarding to Linix VM using Virtual Network Editor.


What a firewall used for?

to protect a computer or network from unauthorized access


Specialized computers that manage network resources and allow computers to access the network are called?

proxy or firewall


Can someone allow specific users to bypass a network firewall?

Yes, someone can allow a specific user to bypass a network firewall. The simplest way to do this is to add their IP Address into the network. This will allow them access past the firewall very easily.


What can you do to prevent security Hacking?

Implement firewall hardware as well as firewall software on your computer/computer network and implement the use of Access Control Lists (ACLs) on your network's routers.


What are the disadvantages of firewall?

Firewall provides a way of controlling network access to a computer. However, using firewall may degrade the performance of the system. It is also difficult to configure and maintain the firewall.


Can you access a computer remotely without a server or viewer installed on that computer in example the opposite of a VNC application?

If you can get onto a computer's network, then yes. From there you must bypass their security programs and firewall. It's not easy for script buddies but for professionals it's like breathing.


How you can access to specific computer that locate withing wireless network?

You can use its IP address or network name (your firewall has to be configured properly).


What is a function performed by an intermediary permits only known trusted data to access the network?

firewall