Mastering SSH Proxy on Palo Alto Networks Firewalls for Enhanced Security

Introduction to SSH Proxy in PAN-OS

Secure Shell (SSH) is a ubiquitous protocol for secure remote login, command execution, and file transfer. However, its encrypted nature can be exploited by malicious actors to create covert channels for command-and-control (C2) communication, data exfiltration, or tunneling other protocols, bypassing traditional security controls. Palo Alto Networks Next-Generation Firewalls (NGFWs) address this challenge with the SSH Proxy feature.

SSH Proxy in PAN-OS enables the firewall to act as a "man-in-the-middle" (MITM) for SSH sessions. It decrypts SSH traffic, allowing for inspection by App-ID and enforcement through Security policies. This capability is crucial for identifying and blocking unauthorized SSH tunneling (e.g., X11 forwarding, TCP port forwarding) and detecting applications or threats attempting to hide within SSH encryption.

CRITICAL (Palo Alto Networks): The primary goal of SSH Proxy is not to inspect the content of interactive shell commands or files being transferred in real-time (like Antivirus profiles do for other protocols), but rather to identify and control the *types* of SSH channels and embedded applications. It prevents SSH from being used as an unchecked, encrypted bypass for other network restrictions.

How SSH Proxy Works in PAN-OS

When SSH Proxy is configured for specific traffic via a Decryption policy:

  1. The Palo Alto Networks firewall intercepts the SSH connection initiated by a client to a server.
  2. The firewall establishes its own SSH session to the destination server, essentially acting as an SSH client from the server's perspective.
  3. Simultaneously, the firewall acts as an SSH server to the original client, presenting its own SSH proxy host key.
  4. The firewall decrypts traffic from the client, inspects it (primarily using App-ID to identify SSH channel types like session , X11 , forwarded-tcpip , direct-tcpip ), and applies Security policies.
  5. If allowed, the firewall re-encrypts the traffic and forwards it to the server (and vice-versa for server responses).

Automatic Key Generation: The Palo Alto Networks firewall automatically generates a unique RSA key pair specifically for its SSH Proxy functionality during boot-up. This key is used when the firewall presents itself as an SSH server to the client. There is no need to manually manage or upload SSH certificates for this feature, unlike SSL Forward Proxy.

Impact on SSH Host Key Verification: Because the firewall is intercepting the SSH session, the client will see the firewall's SSH proxy host key instead of the actual server's host key. This will likely trigger a host key mismatch warning on the SSH client if the client has previously connected to the server directly. Users may need to be educated about this, or accept the new host key.

PCNSE/PCNSA Exam Note (Palo Alto Networks): Understand that SSH Proxy is a form of active decryption. The Palo Alto Networks firewall does not use the server's private key. Instead, it terminates the client's SSH session and initiates a new one to the server, bridging the two. This is why clients see the firewall's host key.

Supported PAN-OS Versions and Platforms

SSH Proxy functionality is available on all Palo Alto Networks PA-Series, VM-Series, and CN-Series firewalls running supported PAN-OS versions (e.g., PAN-OS 9.1, 10.0, 10.1, 10.2, 11.0 and later). Always refer to the specific PAN-OS release notes for the most current information on features and capabilities.

Prerequisites for SSH Proxy Configuration

Gotcha! (Palo Alto Networks): Attempting to configure SSH Proxy on a Palo Alto Networks firewall for traffic not passing through a supported interface type (Virtual Wire, L2, L3) will result in the proxy not engaging, and traffic will pass through undecrypted (or be blocked if no matching allow rule exists).

Key Palo Alto Networks Concepts for SSH Proxy

Decryption Policy

The Decryption Policy is the cornerstone for enabling SSH Proxy in PAN-OS. A Decryption Policy rule identifies the specific SSH traffic that the Palo Alto Networks firewall should decrypt. Key parameters for an SSH Proxy Decryption rule:

Decryption Profile (SSH Proxy specific settings)

A Decryption Profile can be attached to an SSH Proxy Decryption rule in PAN-OS to control various parameters of the SSH handshake and protocol. This allows for granular control over the security aspects of the proxied SSH connections. Navigate to Objects > Decryption > Decryption Profile in the PAN-OS GUI, add a new profile, and select the "SSH" tab.

Key settings within a Palo Alto Networks SSH Decryption Profile:

If no Decryption Profile is attached to the SSH Proxy rule, the Palo Alto Networks firewall uses default SSH proxy settings which are generally secure but may not align with specific organizational compliance requirements.

PCNSE/PCNSA Exam Note (Palo Alto Networks): Remember that Decryption Profiles for SSH Proxy on Palo Alto Networks firewalls allow you to enforce cryptographic standards for the proxied connections. You can block outdated SSH versions or weak algorithms. This is a key control point.

App-ID Integration

Once SSH traffic is decrypted by the Palo Alto Networks SSH Proxy, the firewall's App-ID technology inspects the decrypted flow. App-ID can identify the specific type of SSH channel being used, such as:

This identification by App-ID is crucial for creating targeted Security policies on the Palo Alto Networks firewall.

Security Policy

After decryption and App-ID classification by the Palo Alto Networks firewall, Security Policies are evaluated to determine whether to allow or deny the traffic. This is where the actual enforcement happens based on the identified application. For example, you might have:

Gotcha! (Palo Alto Networks): Simply enabling SSH Proxy via a Decryption policy on a Palo Alto Networks firewall does not automatically block SSH tunnels. You MUST configure corresponding Security policy rules to deny traffic identified by App-ID as ssh-tunnel or other unwanted applications within the SSH flow.

Step-by-Step Configuration in PAN-OS (GUI)

Configuring SSH Proxy on a Palo Alto Networks firewall involves creating a Decryption Profile (optional but recommended), a Decryption Policy rule, and appropriate Security Policy rules. These steps are based on PAN-OS 11.0, but are generally applicable to recent PAN-OS versions.

1. Verify Interface and Zone Configuration

2. Create/Configure a Decryption Profile for SSH Proxy (Recommended)

  1. Go to Objects > Decryption > Decryption Profile .
  2. Click Add or clone an existing profile.
  3. Name the profile (e.g., SSH-Proxy-Strict-Profile ).
  4. Protocol Version Checks:
    • Tick Block unsupported versions .
    • Tick Block SSHv1 connections (Highly Recommended).
  5. Unsupported Mode Checks: For each category (Key Exchange, Encryption Ciphers, MAC Algorithms, Server Host Key Algorithms), select the algorithms you want to block . Best practice is to block known weak or legacy algorithms. Consult Palo Alto Networks documentation or security guidelines for current recommendations.
  6. Click OK .

3. Create a Decryption Policy Rule

  1. Go to Policies > Decryption .
  2. Click Add .
  3. General Tab:
    • Name the rule (e.g., Decrypt-Outbound-SSH ).
    • Optionally, add a description and tags.
  4. Source Tab:
    • Specify Source Zones (e.g., trust ).
    • Specify Source Addresses (e.g., any or specific subnets/IPs).
  5. Destination Tab:
    • Specify Destination Zones (e.g., untrust ).
    • Specify Destination Addresses (e.g., any or specific server IPs).
  6. Service/URL Category Tab:
    • Under Service, add service-ssh (or a custom service object for TCP/22). You can also specify the application ssh here.
  7. Options Tab:
    • Set Action to Decrypt .
    • Set Type to SSH Proxy .
    • Optionally, select the Decryption Profile created in Step 2 from the dropdown (e.g., SSH-Proxy-Strict-Profile ). If no profile is selected, default PAN-OS SSH Proxy settings apply.
  8. Click OK . Ensure this rule is appropriately ordered within your Decryption policy set.
PCNSE/PCNSA Exam Note (Palo Alto Networks): For the PCNSE exam, be very clear on the settings in the 'Options' tab of a Decryption Policy rule when configuring SSH Proxy on a Palo Alto Networks firewall: Action=Decrypt, Type=SSH Proxy.

4. Configure Security Policy Rules

After SSH traffic is decrypted by the Palo Alto Networks firewall, it's subject to Security Policy. You need rules to allow legitimate SSH and block unwanted tunneling.

  1. Go to Policies > Security .
  2. Rule to Allow Legitimate SSH:
    • Click Add .
    • Name: e.g., Allow-SSH-App .
    • Source/Destination Zones and Addresses: As appropriate for your allowed SSH flows.
    • Application: Add ssh . You might also add sftp and scp if you want to be explicit, though these are often identified within the base ssh App-ID post-decryption by the Palo Alto Networks firewall.
    • Service: application-default (recommended) or service-ssh .
    • Action: Allow .
    • Profiles: Apply any relevant Security Profiles (Antivirus, Vulnerability Protection, Anti-Spyware, File Blocking) as needed. While SSH Proxy itself doesn't inspect file content deeply, profiles can act on known malicious signatures if tunneled executables are identified by App-ID. For example, Anti-Spyware profiles can detect C2 signatures that might be present in SSH traffic.
    • Click OK .
  3. Rule to Block SSH Tunneling:
    • Click Add . This rule should typically be placed *before* a broader "allow ssh" rule if you want to selectively block tunneling while allowing normal SSH, or after if you want to allow specific SSH tunnels and block others. A common strategy is to block all ssh-tunnel by default.
    • Name: e.g., Block-SSH-Tunnel .
    • Source/Destination Zones and Addresses: As appropriate (often broad to prevent tunneling generally).
    • Application: Add ssh-tunnel .
    • Service: application-default or any (as the port might not be standard if tunneled).
    • Action: Deny or Drop .
    • Click OK .

5. Commit Configuration

Managing SSH Proxy Operations

Authentication Considerations

CRITICAL (Palo Alto Networks): Systems or users that *require* public key authentication for SSH access must be excluded from Palo Alto Networks SSH Proxy decryption. This is typically done by creating a "No Decrypt" Decryption Policy rule placed *before* the SSH Proxy Decrypt rule, specifically matching the traffic to/from these systems.

Configuring Exclusions for PKA systems on a Palo Alto Networks firewall:

  1. Go to Policies > Decryption .
  2. Click Add to create a new rule. Place this rule *above* your general SSH Proxy decryption rule (rule order is critical in PAN-OS).
  3. Define the Source/Destination (e.g., IP of the server requiring PKA, or specific client IPs).
  4. Set Service to service-ssh .
  5. In the Options tab, set Action to No Decrypt .
  6. Click OK and commit the changes to the firewall.

Impact on SSH Client Experience

Traffic Inspection Capabilities and Limitations within Palo Alto Networks SSH Proxy

Gotcha! (Palo Alto Networks): Do not expect Palo Alto Networks SSH Proxy to perform the same level of content inspection (e.g., antivirus scanning of file transfers within SSH) as SSL Forward Proxy does for web traffic. Its main strength is controlling SSH usage patterns (via App-ID) and blocking unauthorized tunneling.

Performance Considerations

Logging, Monitoring, and Troubleshooting SSH Proxy on Palo Alto Networks Firewalls

Log Analysis

Effective monitoring of SSH Proxy on Palo Alto Networks firewalls relies on analyzing various logs in PAN-OS:

CLI Troubleshooting Commands for PAN-OS

The PAN-OS CLI provides powerful tools for deeper inspection of SSH Proxy operations:

Common Issues and Resolutions for Palo Alto Networks SSH Proxy

Issue Potential Palo Alto Networks Cause(s) Troubleshooting Steps & Resolution (Palo Alto Networks Context)
SSH connections fail entirely for proxied traffic. - Palo Alto Networks firewall cannot connect to the backend SSH server (routing, Security Policy blocking firewall-initiated session).
- SSH Decryption Profile blocks essential algorithms/versions used by client/server.
- Client attempting Public Key Authentication (PKA).
- Check firewall's connectivity to the server (ping from firewall CLI using correct source interface, check Traffic logs for firewall-to-server leg potentially being denied by policy).
- Review Decryption logs for errors (e.g., "Unsupported cipher," "Protocol mismatch"). Adjust SSH Decryption Profile on the firewall if necessary.
- Confirm client is using username/password. If PKA is required, create a "No Decrypt" rule for that specific traffic flow.
Clients receive SSH host key warnings (e.g., "REMOTE HOST IDENTIFICATION HAS CHANGED!"). Expected behavior: Client sees Palo Alto Networks firewall's proxy host key. - Educate users to accept the new key after initial setup (this is the firewall's key).
- For internal environments, advanced users could potentially add the firewall's SSH proxy public key to their `known_hosts` file, but this is rarely done for SSH proxy and requires distributing the key.
SSH tunneling (e.g., port forwarding via `ssh-tunnel` App-ID) is still possible. No PAN-OS Security Policy rule to block ssh-tunnel , or the rule is misconfigured/misordered (e.g., an "allow any" rule is hit first). - Verify a Security Policy rule exists with application ssh-tunnel and action Deny .
- Ensure this deny rule is placed correctly in the Security Policy rulebase (typically before broader allow rules for `ssh`).
- Check Traffic logs to see which Security Policy rule is matching the ssh-tunnel traffic.
Legitimate SSH (interactive shell, identified as `ssh` App-ID) is blocked. PAN-OS Security Policy rule for ssh application is missing, misconfigured, or a deny rule (e.g., an overly broad `ssh-tunnel` deny, or default deny) is taking precedence. - Verify a Security Policy rule allows ssh application for the relevant zones/IPs.
- Check Traffic logs for the specific session to see which rule is blocking it and why (e.g., "rule: default-deny").
High CPU utilization on the Palo Alto Networks firewall. Large volume of SSH traffic being decrypted by SSH Proxy. - Monitor CPU with show running resource-monitor on the firewall CLI.
- Review if all SSH traffic being decrypted is necessary. Consider "No Decrypt" exclusions for high-volume, trusted internal SSH flows not requiring tunnel inspection or where PKA is used.
- Evaluate firewall sizing if SSH decryption is a critical and heavy workload. Consult Palo Alto Networks performance datasheets.
PCNSE/PCNSA Exam Note (Palo Alto Networks): For troubleshooting Palo Alto Networks SSH Proxy, know which logs (Traffic, Decryption) provide which type of information. Also, be acutely aware of the Public Key Authentication (PKA) limitation as a common cause of "failed connections" when SSH Proxy is active. Understanding rule order for both Decryption and Security policies is critical.

Advanced SSH Proxy Scenarios and Best Practices for Palo Alto Networks Environments

Palo Alto Networks SSH Proxy Flow Diagrams

Diagram 1: PAN-OS SSH Proxy Man-in-the-Middle (MITM) Detailed Flow

This diagram illustrates the detailed Man-in-the-Middle (MITM) process employed by the Palo Alto Networks firewall when SSH Proxy is active. It shows the two separate SSH sessions (Client-to-Firewall and Firewall-to-Server) and the points of decryption by the firewall, inspection (App-ID, Security Policy), and re-encryption for forwarding.

This diagram illustrates the detailed Man-in-the-Middle (MITM) process employed by the Palo Alto Networks firewall when SSH Proxy is active. It shows the two separate SSH sessions (Client-to-Firewall and Firewall-to-Server) and the points of decryption by the firewall, inspection (App-ID, Security Policy), and re-encryption for forwarding.

Diagram 2: PAN-OS SSH Traffic Processing Decision Flow (with SSH Proxy)

This decision tree outlines how Palo Alto Networks firewalls process SSH traffic. It highlights when SSH Proxy is engaged based on interface type and Decryption Policy, how different SSH client authentication methods affect the flow (especially PKA), and the subsequent roles of App-ID classification and Security Policy enforcement on the decrypted or bypassed traffic.

This decision tree outlines how Palo Alto Networks firewalls process SSH traffic. It highlights when SSH Proxy is engaged based on interface type and Decryption Policy, how different SSH client authentication methods affect the flow (especially PKA), and the subsequent roles of App-ID classification and Security Policy enforcement on the decrypted or bypassed traffic.

Diagram 3: PAN-OS Policy Interaction for SSH Traffic with SSH Proxy

This diagram shows the interaction between Decryption Policies and Security Policies in PAN-OS for SSH traffic. It illustrates how traffic flows through different policy evaluation stages on a Palo Alto Networks firewall, depending on whether SSH Proxy decryption is applied. Key configuration elements like Decryption rules and Security rules for `ssh` and `ssh-tunnel` applications are shown influencing these paths.

This diagram shows the interaction between Decryption Policies and Security Policies in PAN-OS for SSH traffic. It illustrates how traffic flows through different policy evaluation stages on a Palo Alto Networks firewall, depending on whether SSH Proxy decryption is applied. Key configuration elements like Decryption rules and Security rules for `ssh` and `ssh-tunnel` applications are shown influencing these paths.

PCNSE Exam Focus: Key Takeaways for Palo Alto Networks SSH Proxy

PCNSE Knowledge Check: Palo Alto Networks SSH Proxy

1. What is the primary purpose of configuring SSH Proxy on a Palo Alto Networks firewall?

A) To accelerate SSH traffic performance by caching SSH keys.
B) To enable public key authentication for all SSH sessions proxied by the firewall.
C) To decrypt SSH traffic for App-ID inspection and control of SSH channel types (e.g., blocking ssh-tunnel).
D) To perform deep content inspection and antivirus scanning on files transferred via SFTP, similar to HTTP AV scanning.

2. Which settings are mandatory in a Palo Alto Networks Decryption Policy rule to enable SSH Proxy?

A) Action: Allow, Type: SSL Forward Proxy
B) Action: Decrypt, Type: SSH Proxy
C) Action: No Decrypt, Type: SSH Proxy
D) Action: Decrypt, Type: SSL Inbound Inspection

3. Which SSH authentication method is NOT supported when SSH Proxy is active on a Palo Alto Networks firewall?

A) Username and Password
B) Keyboard-Interactive (challenge-response) for some MFA prompts
C) TACACS+ or RADIUS brokered username/password authentication
D) Public Key Authentication (PKA)

4. After enabling SSH Proxy and decrypting SSH traffic on a Palo Alto Networks firewall, what feature is primarily used to identify applications like `ssh-tunnel` within the decrypted flow for policy enforcement?

A) App-ID
B) User-ID
C) Content-ID (Antivirus profile)
D) WildFire

5. A network administrator has configured SSH Proxy on their Palo Alto Networks firewall. To prevent users from using SSH for arbitrary TCP port forwarding, which Security Policy configuration is most appropriate?

A) Allow application `ssh` and deny application `tcp-forwarding` (Note: `tcp-forwarding` is not a standard top-level App-ID for this purpose).
B) Deny service `service-ssh` for all users except administrators.
C) Allow application `ssh` (for shell/SFTP) and explicitly deny application `ssh-tunnel`.
D) Create an SSH Decryption Profile that blocks port forwarding capabilities.

6. On which of the following Palo Alto Networks firewall interface types is SSH Proxy decryption supported?

A) Tap Mode only
B) Layer 3, Layer 2, and Virtual Wire
C) Tunnel Interface (for the tunnel's own management SSH) only
D) All interface types including Decrypt Mirror interfaces

7. What happens to the SSH server's host key when a client connects through a Palo Alto Networks firewall configured with SSH Proxy?

A) The client sees the Palo Alto Networks firewall's SSH proxy host key.
B) The client sees the original server's host key, as the firewall transparently forwards it.
C) The Palo Alto Networks firewall dynamically generates a unique host key for each session, signed by its Forward Trust CA.
D) Host key verification is bypassed entirely by the SSH Proxy feature.

8. If an administrator needs to allow SSH access using public key authentication (PKA) for a specific critical server, while using Palo Alto Networks SSH Proxy for other SSH traffic, how should this be configured?

A) Create a custom App-ID for the critical server's SSH traffic that supports PKA.
B) Configure the SSH Decryption Profile attached to the SSH Proxy rule to specifically "Allow PKA".
C) Use a Security Policy rule with a custom action "Allow PKA for SSH".
D) Create a "No Decrypt" Decryption Policy rule for traffic to/from the critical server, placed before the general SSH Proxy decryption rule.

9. Which PAN-OS log type is most useful for troubleshooting issues with the SSH Proxy handshake itself on a Palo Alto Networks firewall, such as cipher mismatches or protocol version problems blocked by a Decryption Profile?

A) Traffic Log
B) Threat Log
C) Decryption Log
D) System Log

10. A Palo Alto Networks SSH Decryption Profile allows an administrator to:

A) Specify which User-ID mapped users are allowed to use SSH tunneling.
B) Block SSH sessions using weak ciphers or outdated SSH protocol versions (e.g., SSHv1).
C) Define the specific destination IP addresses for allowed SSH servers within the profile itself.
D) Directly scan files transferred via SFTP for malware using Antivirus signatures within the Decryption Profile.

11. True or False: The Palo Alto Networks firewall automatically generates the necessary RSA key pair for SSH Proxy operations; no manual certificate upload (like a CA certificate for SSL Forward Proxy) is required for the proxy's own server-facing identity in the SSH handshake with the client.

A) True
B) False

12. What is a common side effect of enabling SSH Proxy on a Palo Alto Networks firewall that users might observe, requiring potential user education?

A) SSH sessions become significantly faster due to firewall optimization.
B) Users are forced to use SSHv1, as SSHv2 is not supported by the proxy.
C) Public key authentication (PKA) becomes mandatory for all proxied SSH sessions.
D) SSH clients may present a "remote host identification has changed" warning upon first connection post-proxy enablement.

13. If SSH Proxy is enabled on a Palo Alto Networks firewall, and App-ID correctly identifies `ssh-tunnel` traffic, but SSH tunneling is still occurring, what is the most likely misconfiguration?

A) The Decryption Policy rule for SSH Proxy is missing or disabled.
B) There is no Security Policy rule denying the `ssh-tunnel` application, or an overly permissive allow rule is taking precedence.
C) The SSH Decryption Profile is not configured to block tunneling (Profiles don't block App-IDs directly).
D) The interface involved is configured in Tap mode.

14. How does SSH Proxy on a Palo Alto Networks firewall affect Quality of Service (QoS) markings (e.g., DSCP) on SSH traffic?

A) QoS markings are always preserved and honored by the firewall from client to server.
B) QoS markings can be re-written based on settings in the SSH Decryption Profile.
C) Proxied SSH traffic does not support DSCP code points or QoS markings from the original client session; original markings are typically lost across the proxy.
D) SSH Proxy automatically assigns the highest QoS priority to all proxied SSH traffic.

15. Which Palo Alto Networks feature can be combined with SSH Proxy policies to enforce SSH controls based on user identity (e.g., Active Directory group) rather than just source IP address?

A) User-ID
B) GlobalProtect Client
C) Panorama Network Management
D) AutoFocus Threat Intelligence

16. When an SSH session is decrypted by SSH Proxy on a Palo Alto Networks firewall, what level of content inspection is typically performed within an interactive SSH shell session for typed commands or server output?

A) Full keystroke logging and real-time command analysis for malicious patterns.
B) Antivirus scanning of all text output received from the server within the shell.
C) Blocking of specific SSH commands (e.g., `rm -rf`) based on a predefined command blacklist in a Security Profile.
D) Primarily App-ID identification of the channel type (e.g., `ssh` for shell); deep, granular inspection of shell commands/output content is limited.

17. In a Palo Alto Networks firewall, if an SSH Decryption Profile is configured to "Block unsupported versions" and "Block SSHv1 connections", what happens if a client attempts an SSHv1 connection through a Decryption Policy rule using this profile?

A) The connection is allowed but logged with a warning about SSHv1 in the Traffic Log.
B) The connection attempt is blocked by the SSH Proxy during the handshake, and this is logged in the Decryption Log.
C) The firewall transparently upgrades the connection to SSHv2 if the server supports it, then proxies it.
D) The firewall sends an alert to Panorama but allows the connection to proceed to maintain compatibility.

18. A security team using a Palo Alto Networks firewall wants to identify which users (mapped by User-ID) are attempting to use SSH port forwarding. Which PAN-OS logs should they primarily consult after configuring SSH Proxy and relevant Security Policies?

A) System Logs and Config Logs.
B) Threat Logs and URL Filtering Logs.
C) Traffic Logs (filtered for application `ssh-tunnel` and showing User-ID) and Decryption Logs (for handshake success/failure).
D) WildFire Logs and Data Filtering Logs.

19. To ensure SSH Proxy functions correctly, the Palo Alto Networks firewall must be placed in the traffic path in such a way that it can actively intercept and terminate/re-establish connections. This means it cannot operate effectively for SSH Proxy if its relevant interfaces are configured purely in which mode?

A) Tap Mode
B) Virtual Wire Mode (with decryption forwarding enabled)
C) Layer 2 Mode
D) Layer 3 Mode

20. What is the Palo Alto Networks recommended best practice regarding the `ssh-tunnel` application in Security Policies when SSH Proxy is implemented for general SSH traffic visibility and control?

A) Always allow `ssh-tunnel` application for all users to ensure maximum flexibility for developers.
B) Allow `ssh-tunnel` only from the 'untrust' zone to the 'trust' zone.
C) Allow `ssh-tunnel` but apply a strict Antivirus and Vulnerability Protection profile to it.
D) Explicitly deny the `ssh-tunnel` application by default in Security Policy, and only allow it for specific, approved users/servers if a valid business need exists.