If SSH key is used for authentication ports restrictions are not applied.
vulners.com/securityvulns/securityvulns:doc:9227