<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Prevent SSH response on VR-Default in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68318#M18532</link>
    <description>&lt;P&gt;Thanks for the suggestions - we did not want to go down the route of allowing specific IPs or IP ranges though. As mentioned above, there are only two active VLANs other than the management VLAN, so we have done the following:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;create access-list DenySSH " protocol 6 ; destination-port 22 ;" " deny &amp;nbsp;;"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;configure access-list add DenySSH last vlan VLAN1 ingress&lt;BR /&gt;configure access-list add DenySSH last vlan VLAN2 ingress&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This seems to have done the job.&lt;/P&gt;&lt;P&gt;I’d be interested to know if there are any potential drawbacks to this approach?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 27 Oct 2020 21:47:57 GMT</pubDate>
    <dc:creator>Jon_P</dc:creator>
    <dc:date>2020-10-27T21:47:57Z</dc:date>
    <item>
      <title>Prevent SSH response on VR-Default</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68310#M18524</link>
      <description>&lt;P&gt;I have an X460-G2 on firmware 30.3.1.6.&lt;/P&gt;&lt;P&gt;I want SSH access to only be available from VR-Mgmt, so I have configured as follows:&lt;BR /&gt;&lt;EM&gt;enable ssh2 vr VR-Mgmt&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;If I attempt to SSH to the device using an IP that belongs to VR-Default, while I can’t log in I do get an SSH login prompt. Additionally if I use portqry to probe port 22 the port is returned as ‘listening’. The addresses in question are accessible from the internet so this is not really acceptable from a security standpoint.&lt;/P&gt;&lt;P&gt;I have already disabled SSH and re-enabled specifically specifying VR-Mgmt.&lt;/P&gt;&lt;P&gt;Firstly - how can I prevent all SSH repsonse on VR-Default? Port 22 should not be seen as open.&lt;BR /&gt;I do not wish to restrict access to specific IP addresses - it should be allowed from&amp;nbsp;VR-Mgmt and nowhere else.&lt;BR /&gt;&lt;BR /&gt;Secondly - surely this behaviour is a bug and there should be no response on VR-Default? Why would the device respond when SSH is specifically only enabled on VR-Mgmt?&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 18:08:46 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68310#M18524</guid>
      <dc:creator>Jon_P</dc:creator>
      <dc:date>2020-10-27T18:08:46Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent SSH response on VR-Default</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68311#M18525</link>
      <description>&lt;P&gt;If you do a “show config”, are there any other lines that might enable ssh?&lt;BR /&gt;In my configs (on 16.x), the “enable ssh vr vr-mgmt” is the only “ssh” line in the config&lt;/P&gt;&lt;P&gt;Note: I’m clueless about 30.x &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 18:35:55 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68311#M18525</guid>
      <dc:creator>Frank</dc:creator>
      <dc:date>2020-10-27T18:35:55Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent SSH response on VR-Default</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68312#M18526</link>
      <description>&lt;P&gt;I have the same as you:&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;# Module exsshd configuration.&lt;BR /&gt;#&lt;BR /&gt;enable ssh2 vr VR-Mgmt&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;All the rest of the SSH config is at default values I believe:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;EM&gt;# show config detail exsshd&lt;BR /&gt;#&lt;BR /&gt;# Module exsshd configuration.&lt;BR /&gt;#&lt;BR /&gt;enable ssh2 port 22 vr VR-Mgmt&lt;BR /&gt;configure ssh2 secure-mode off&lt;BR /&gt;configure ssh2 dh-group minimum 14&lt;BR /&gt;configure ssh2 idletimeout 60&lt;BR /&gt;configure ssh2 disable cipher aes128-cbc&lt;BR /&gt;configure ssh2 disable cipher 3des-cbc&lt;BR /&gt;configure ssh2 disable cipher blowfish-cbc&lt;BR /&gt;configure ssh2 disable cipher cast128-cbc&lt;BR /&gt;configure ssh2 disable cipher aes192-cbc&lt;BR /&gt;configure ssh2 disable cipher aes256-cbc&lt;BR /&gt;configure ssh2 disable cipher arcfour&lt;BR /&gt;configure ssh2 disable cipher rijndael-cbc@lysator.liu.se&lt;BR /&gt;configure ssh2 enable cipher aes128-ctr&lt;BR /&gt;configure ssh2 enable cipher aes192-ctr&lt;BR /&gt;configure ssh2 enable cipher aes256-ctr&lt;BR /&gt;configure ssh2 disable cipher arcfour256&lt;BR /&gt;configure ssh2 disable cipher arcfour128&lt;BR /&gt;configure ssh2 enable cipher chacha20-poly1305@openssh.com&lt;BR /&gt;configure ssh2 disable mac hmac-md5-etm@openssh.com&lt;BR /&gt;configure ssh2 enable mac hmac-sha1-etm@openssh.com&lt;BR /&gt;configure ssh2 enable mac hmac-sha2-256-etm@openssh.com&lt;BR /&gt;configure ssh2 enable mac hmac-sha2-512-etm@openssh.com&lt;BR /&gt;configure ssh2 disable mac hmac-ripemd160-etm@openssh.com&lt;BR /&gt;configure ssh2 disable mac hmac-sha1-96-etm@openssh.com&lt;BR /&gt;configure ssh2 disable mac hmac-md5-96-etm@openssh.com&lt;BR /&gt;configure ssh2 disable mac hmac-md5&lt;BR /&gt;configure ssh2 enable mac hmac-sha1&lt;BR /&gt;configure ssh2 enable mac hmac-sha2-256&lt;BR /&gt;configure ssh2 enable mac hmac-sha2-512&lt;BR /&gt;configure ssh2 disable mac hmac-ripemd160&lt;BR /&gt;configure ssh2 disable mac hmac-ripemd160@openssh.com&lt;BR /&gt;configure ssh2 disable mac hmac-sha1-96&lt;BR /&gt;configure ssh2 disable mac hmac-md5-96&lt;BR /&gt;configure ssh2 rekey time-interval none&lt;BR /&gt;configure ssh2 rekey data-limit default&lt;BR /&gt;configure ssh2 enable pk-alg ssh-rsa&lt;BR /&gt;configure ssh2 disable pk-alg ssh-dss&lt;BR /&gt;configure ssh2 enable pk-alg x509v3-sign-rsa&lt;BR /&gt;configure ssh2 enable pk-alg x509v3-sign-dss&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 18:40:13 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68312#M18526</guid>
      <dc:creator>Jon_P</dc:creator>
      <dc:date>2020-10-27T18:40:13Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent SSH response on VR-Default</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68313#M18527</link>
      <description>&lt;P&gt;Sounds like it’s similar to SNMP then - “we listen everywhere, and let the CPU sort things out”. I fear ACLs are in your future, but I hope someone with more experience can weigh in.&lt;/P&gt;&lt;P&gt;Sorry!&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 19:31:19 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68313#M18527</guid>
      <dc:creator>Frank</dc:creator>
      <dc:date>2020-10-27T19:31:19Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent SSH response on VR-Default</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68314#M18528</link>
      <description>&lt;P&gt;I was surprised because I with think ssh would be effectively disabled on the default VR. I would think getting a prompt is a bug. Unless Extreme agrees and changes the behavior which I am sure will require a code upgrade I agree an ACL would be the only option.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 19:43:29 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68314#M18528</guid>
      <dc:creator>davidj_cogliane</dc:creator>
      <dc:date>2020-10-27T19:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent SSH response on VR-Default</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68315#M18529</link>
      <description>&lt;P&gt;So if I need to use an ACL, what is the best approach? It doesn’t seem to be possible to specify a VR as a match condition as far as I can see.&lt;/P&gt;&lt;P&gt;There are only two active VLANs/SVIs in VR-Default, would it be best just to deny SSH for those VLANs?&lt;/P&gt;&lt;P&gt;Can anyone give a sample configuration?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 20:46:43 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68315#M18529</guid>
      <dc:creator>Jon_P</dc:creator>
      <dc:date>2020-10-27T20:46:43Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent SSH response on VR-Default</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68316#M18530</link>
      <description>&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Below is an article that explains the ACL and how to apply it:&lt;/P&gt;&lt;P&gt;&lt;A href="https://gtacknowledge.extremenetworks.com/articles/Q_A/SSH-Access-Profile" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/Q_A/SSH-Access-Profile&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Chris Thompson&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 20:56:02 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68316#M18530</guid>
      <dc:creator>CThompsonEXOS</dc:creator>
      <dc:date>2020-10-27T20:56:02Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent SSH response on VR-Default</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68317#M18531</link>
      <description>&lt;P&gt;Next thought is that since you and I both mentioned this looks like a bug, open a TAC case and see if it can be resolved.&lt;/P&gt;&lt;P&gt;Or this is not exactly what you wanted to do but seems like a good work around since it sounded like the internet was your primary concern.&lt;/P&gt;&lt;P&gt;entry AllowTheseSubnets {&lt;BR /&gt;if match any {&lt;BR /&gt;source-address 10.10.1.0 /24;&lt;BR /&gt;source-address 10.10.2.0 /24;&lt;BR /&gt;} then {&lt;BR /&gt;permit;&lt;BR /&gt;}&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL start="3"&gt;&lt;LI&gt;Write and quit the CLI editor by pressing the escape key and typing ":wq"&lt;/LI&gt;	&lt;LI&gt;Apply the access profile. "configure ssh2 access-profile &amp;lt;POLICY_NAME&amp;gt;"&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Tue, 27 Oct 2020 20:56:59 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68317#M18531</guid>
      <dc:creator>davidj_cogliane</dc:creator>
      <dc:date>2020-10-27T20:56:59Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent SSH response on VR-Default</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68318#M18532</link>
      <description>&lt;P&gt;Thanks for the suggestions - we did not want to go down the route of allowing specific IPs or IP ranges though. As mentioned above, there are only two active VLANs other than the management VLAN, so we have done the following:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;create access-list DenySSH " protocol 6 ; destination-port 22 ;" " deny &amp;nbsp;;"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;configure access-list add DenySSH last vlan VLAN1 ingress&lt;BR /&gt;configure access-list add DenySSH last vlan VLAN2 ingress&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This seems to have done the job.&lt;/P&gt;&lt;P&gt;I’d be interested to know if there are any potential drawbacks to this approach?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 21:47:57 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68318#M18532</guid>
      <dc:creator>Jon_P</dc:creator>
      <dc:date>2020-10-27T21:47:57Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent SSH response on VR-Default</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68319#M18533</link>
      <description>&lt;P&gt;The drawback is that when you add the next VLAN in the future and forget to add the policy to that VLAN, you’ll not have the intended protection. In security, always forbid everything and allow only what you explicitly want. I’d rather use an ACL allowing SSH from the management network and then a global ACL to deny it.&lt;/P&gt;&lt;P&gt;Oh, by the way, you just disabled all SSH access THROUGH the switch as well… I guess that’s not what you intended?&lt;/P&gt;&lt;P&gt;I’m pretty sure there’s a better way of doing this but it’s way too late for me to think straight now.&lt;/P&gt;&lt;P&gt;/Fredrik&lt;/P&gt;</description>
      <pubDate>Fri, 06 Nov 2020 08:20:41 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68319#M18533</guid>
      <dc:creator>FredrikB</dc:creator>
      <dc:date>2020-11-06T08:20:41Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent SSH response on VR-Default</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68320#M18534</link>
      <description>&lt;P&gt;Thanks &lt;USER-MENTION data-id="9867978"&gt;@FredrikB&lt;/USER-MENTION&gt; - all good points. In this case I am working on a WAN edge switch which just has point to point VLANs to our ISP and our firewall’s WAN interface, and the management VLAN, so we will not be adding more VLANs and we don’t allow inbound or outbound SSH traffic.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 18:29:20 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/prevent-ssh-response-on-vr-default/m-p/68320#M18534</guid>
      <dc:creator>Jon_P</dc:creator>
      <dc:date>2020-11-09T18:29:20Z</dc:date>
    </item>
  </channel>
</rss>

