You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access.mdx
+18-18Lines changed: 18 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -193,34 +193,34 @@ SSH sessions have a maximum expected duration of 10 hours. For more information,
193
193
194
194
Failure to connect to your SSH endpoint could be the result of multiple variables. Use the following steps to investigate and resolve the source of your connection failure.
195
195
196
-
1.[Verify that your Access policies](#1-review-access-policies) allow the user to access the target machine.
196
+
1.[Verify that your Access policies](#1-review-access-policies) allow the user to access the target.
3.[Confirm user existence](#3-confirm-user-existence-on-the-target-server) on the target server.
198
+
3.[Confirm user existence](#3-confirm-user-existence-on-the-target-server) on the server.
199
199
4.[Check your `sshd_config` file](#4-debug-sshd_config-file-misconfiguration) for misconfiguration.
200
200
201
201
### 1. Review Access policies
202
202
203
-
A user may be blocked by an Access policy from reaching an SSH target because no explicit allow Access policy exists and Access is set to deny the user by default.
203
+
A user may be blocked by an Access policy from reaching your server because no explicit allow Access policy exists and Access is set to deny the user by default.
204
204
205
205
:::note[Access policies and infrastructure applications]
206
206
207
-
The Access infrastructure application (created in [step 5](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#5-add-an-infrastructure-application)) is the policy container for your SSH server. Cloudflare refers to your SSH server as a [target](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#4-add-a-target).
207
+
The Access infrastructure application (created in [step 5](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#5-add-an-infrastructure-application)) is the policy container for your SSH server. Cloudflare refers to your server that you connect to with SSH as a [target](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#4-add-a-target).
208
208
209
209
[Access policies](/cloudflare-one/policies/access/policy-management/) are the rules attached to this Access infrastructure application, determining who can connect and what UNIX usernames they can log in as on the server. Cloudflare will not create new users on the target. UNIX users must already be present on the server.
210
210
211
-
You were guided to create an Access policy for your SSH target in [substep 9 of step 5: Add an infrastructure application](#5-add-an-infrastructure-application).
211
+
You were guided to create an Access policy for your target in [substep 9 of step 5: Add an infrastructure application](#5-add-an-infrastructure-application).
212
212
213
213
:::
214
214
215
215
#### End users
216
216
217
-
As an end user, run [`warp-cli target list`](/cloudflare-one/applications/non-http/infrastructure-apps/#display-available-targets) to verify that you have access to the target machine.
217
+
As an end user, run [`warp-cli target list`](/cloudflare-one/applications/non-http/infrastructure-apps/#display-available-targets) to verify that you have access to the target.
- If the target appears in the list, confirm that the username you are attempting to connect with is shown in the output. If the username is not shown, an administrator must find the Access policy associated with the target machine and add that username to the Access policy. An administrator should have created an Access policy in [substep 9 of step 5: Add an infrastructure application](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#5-add-an-infrastructure-application). If the username is shown, that means the Access policy should be granting access and you should ensure that the tunnel is healthy in [step 2](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#2-check-target-machine-connection).
221
+
- If the target appears in the list, confirm that the username you are attempting to connect with is shown in the output. If the username is not shown, an administrator must find the Access policy associated with the target and add that username to the Access policy. An administrator should have created an Access policy in [substep 9 of step 5: Add an infrastructure application](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#5-add-an-infrastructure-application). If the username is shown, that means the Access policy should be granting access and you should ensure that the tunnel is healthy in [step 2](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#2-check-target-machine-connection).
222
222
223
-
- If the target does not appear in the list, an administrator must audit the Access policies for the target machine in the Zero Trust dashboard for potential misconfiguration that may be blocking connection.
223
+
- If the target does not appear in the list, an administrator must audit the Access policies for the target in the Zero Trust dashboard for potential misconfiguration that may be blocking connection.
224
224
225
225
#### Administrators
226
226
@@ -238,7 +238,7 @@ You will need Cloudflare dashboard access and log view [permissions](/cloudflare
238
238
239
239
3. Review the **Decision**. If the **Decision** is `Access denied`, select the application and copy the name under App.
240
240
241
-
If the decision is `Access granted`, Access policies are not interfering with your connection attempts and your connection issue is due to the Cloudflare Tunnel, the targetSSH machine, or the `sshd_config` file.
241
+
If the decision is `Access granted`, Access policies are not interfering with your connection attempts and your connection issue is due to the Cloudflare Tunnel ([step 2](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#2-check-target-machine-connection)), the SSH server ([step 3](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#3-confirm-user-existence-on-the-target-server)), or the `sshd_config` file ([step 4](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#4-debug-sshd_config-file-misconfiguration)).
242
242
243
243
4. Go to **Access** > **Applications**.
244
244
@@ -248,13 +248,13 @@ You will need Cloudflare dashboard access and log view [permissions](/cloudflare
248
248
249
249
7. Go to [**Policies**](/cloudflare-one/policies/access/policy-management/#test-your-policies) to review what criteria may be blocking the user.
250
250
251
-
By adding an Access [policy](/cloudflare-one/policies/access/) to allow the user, the connection issue should be resolved. After saving your policy changes, attempt to connect to the target machine as the end user.
251
+
By adding an Access [policy](/cloudflare-one/policies/access/) to allow the user, the connection issue should be resolved. After saving your policy changes, attempt to connect to the server.
252
252
253
253
If you are still having connection issues after auditing your Access policies, review tunnel health in the following step.
254
254
255
-
### 2. Check target machine connection
255
+
### 2. Check target connection
256
256
257
-
If the end user cannot connect to the target SSH machine, the tunnel you set up in [step 1: Connect the server to Cloudflare](#1-connect-the-server-to-cloudflare) may be down or inactive.
257
+
If the end user cannot connect to the target, the tunnel you set up in [step 1: Connect the server to Cloudflare](#1-connect-the-server-to-cloudflare) may be down or inactive.
258
258
259
259
To check the status of your tunnel:
260
260
@@ -276,13 +276,13 @@ To check the status of your tunnel:
276
276
277
277
For detailed steps on troubleshooting, refer to the [Troubleshooting Tunnel documentation](/cloudflare-one/connections/connect-networks/troubleshoot-tunnels/). Review the [Tunnel with Firewall documentation](/cloudflare-one/connections/connect-networks/configure-tunnels/tunnel-with-firewall/#test-connectivity) to ensure your network is correctly configured to allow `cloudflared` connections.
278
278
279
-
After you have verified that there are no issues with your tunnel's health, confirm the user's existence on the target SSH server in the following step.
279
+
After you have verified that there are no issues with your tunnel's health, confirm the user's existence on the server in the following step.
280
280
281
-
### 3. Confirm user existence on the target server
281
+
### 3. Confirm user existence on the server
282
282
283
-
To verify the existence of the end user on the target SSH server, run the `id <USERNAME>` command on the target SSH server to verify that the end user's username exists. If the username does not exist, you must add the user to the server.
283
+
To verify the existence of the end user on the server, run the `id <USERNAME>` command on the server to verify that the end user's username exists. If the username does not exist, you must add the user to the server.
284
284
285
-
If the user exists on the target machine, debug your `sshd_config` file in the following step.
285
+
If the user exists on the server, debug your `sshd_config` file in the following step.
286
286
287
287
### 4. Debug `sshd_config` file misconfiguration
288
288
@@ -292,7 +292,7 @@ One reason a user is failing to connect to your SSH endpoint might be the result
292
292
293
293
`sshd` logs can confirm whether or not the user is making it to the server. The location of your `sshd` logs is defined in your `sshd_config`. The logs location is likely at `journalctl -u ssh` on Ubuntu and `tail /var/log/auth.log` for Red Hat.
294
294
295
-
Using your `sshd` logs, validate that SSH connection attempts are arriving to the SSH target machine.
295
+
Using your `sshd` logs, validate that SSH connection attempts are arriving to the server.
296
296
297
297
#### Review your `sshd_config` file for misconfigurations
The next steps will walk you through a troubleshooting regimen. You will temporarily replace your existing `sshd_config` file with the provided example to rule out configuration issues. Before proceeding, carefully [review and compare both files](#review-your-sshd_config-file-for-misconfigurations) to identify any conflicting directives.
443
443
444
-
:::caution[You may lose access to your SSH server]
444
+
:::caution[You may lose access to your server]
445
445
446
446
These troubleshooting steps could result in you being locked out of your SSH server because your current SSH session may rely on existing configuration that is not in the [example file](#review-your-sshd_config-file-for-misconfigurations). Proceed with utmost caution.
0 commit comments