<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH port is still opened for network scanners. (ACL) in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88666#M21045</link>
    <description>&lt;P&gt;Hi!&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;Actually, I think both your questions have to be directed to GTAC.&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;First question (it’s just my guesses) - when we talking about management access (access-profile), it’s pointed to session (like flows) it’s mean that you block management session (it’s like in flow-based inspection few packets can be forwarded to destination).&lt;/P&gt; &lt;P&gt;When we talking about ACL-based packet processing it’s more to per packet inspection and switch inspect every packet and make decision on it (block or allow).&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;About second issue - you have to give more information. Is there some logs about this issue? IP became unreachable from where (it’s better to have scheme and configuration)?&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;Thank you!&amp;nbsp;&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 05 Dec 2019 20:33:10 GMT</pubDate>
    <dc:creator>Alexandr_P</dc:creator>
    <dc:date>2019-12-05T20:33:10Z</dc:date>
    <item>
      <title>SSH port is still opened for network scanners. (ACL)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88657#M21036</link>
      <description>&lt;P&gt;Hi everybody.&lt;BR /&gt; I have done management access to the switch through ssh and&amp;nbsp;applied the Access Profile. &amp;nbsp;The Access Profile is work. But SSH port is still opened for network scanners. And I have a huge amount of fail access attempts in a log file. How I can completely close the SSH port from outside?&lt;BR /&gt; X590-24x-1q&lt;BR /&gt; ExtremeXOS version 22.6&lt;/P&gt; &lt;P&gt;entry NOC {&lt;BR /&gt; if match any {&lt;BR /&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; source-address x.x.x.x/26 ;&lt;BR /&gt; }&lt;BR /&gt; then {&lt;BR /&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; permit ;&lt;BR /&gt; }&lt;BR /&gt; }&lt;BR /&gt; entry DenyAll {&lt;BR /&gt; &amp;nbsp; &amp;nbsp; if match any {&lt;BR /&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; source-address 0.0.0.0/0;&lt;BR /&gt; &amp;nbsp; &amp;nbsp; }&lt;BR /&gt; &amp;nbsp; &amp;nbsp; then {&lt;BR /&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; deny;&lt;BR /&gt; &amp;nbsp; &amp;nbsp; }&lt;BR /&gt; }&lt;BR /&gt; &amp;nbsp;&lt;/P&gt; &lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Dec 2019 23:37:49 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88657#M21036</guid>
      <dc:creator>Alex_Z</dc:creator>
      <dc:date>2019-12-02T23:37:49Z</dc:date>
    </item>
    <item>
      <title>Re: SSH port is still opened for network scanners. (ACL)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88658#M21037</link>
      <description>&lt;P&gt;Hello!&lt;BR /&gt; &amp;nbsp;&lt;/P&gt; &lt;P&gt;It have to be more information - how do you map this ACL. (to port, to vlan, inbout or outbount, access-profile...)&lt;/P&gt; &lt;P&gt;If you need to restrict SSH access to network - you can&amp;nbsp;add match&amp;nbsp;line with port 22.&lt;/P&gt; &lt;P&gt;If you want to restrict access to switch you have to map with # configure ssh2&amp;nbsp; access-profile &amp;lt;name&amp;gt;.&lt;/P&gt; &lt;P&gt;Also you don’t need match condition&amp;nbsp;&amp;nbsp;source-address 0.0.0.0/0, you can make just:&lt;/P&gt; &lt;P&gt;entry DenyAll {&lt;BR /&gt; &amp;nbsp; &amp;nbsp; if match&amp;nbsp;{&lt;BR /&gt; &amp;nbsp; &amp;nbsp; }&lt;BR /&gt; &amp;nbsp; &amp;nbsp; then {&lt;BR /&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; deny;&lt;/P&gt; &lt;P&gt;it will mark like “all other traffic”&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Mon, 02 Dec 2019 23:52:06 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88658#M21037</guid>
      <dc:creator>Alexandr_P</dc:creator>
      <dc:date>2019-12-02T23:52:06Z</dc:date>
    </item>
    <item>
      <title>Re: SSH port is still opened for network scanners. (ACL)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88659#M21038</link>
      <description>&lt;P&gt;Thanks for the&amp;nbsp;fast answer.&lt;/P&gt; &lt;P&gt;I&amp;nbsp;have mapped this ACL to&amp;nbsp;access-profile :&lt;/P&gt; &lt;P&gt;#&lt;BR /&gt; enable ssh2&lt;BR /&gt; configure ssh2 access-profile TRUSTED-NETWORKS&lt;BR /&gt; &amp;nbsp;&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;Dec &amp;nbsp;2 18:29:19 x.x.x.x exsshd: SSH connection from source 112.85.42.237 has been denied by access-list TRUSTED-NETWORKS. Rejecting connection.&lt;BR /&gt; Dec &amp;nbsp;2 18:30:29 x.x.x.x exsshd: SSH connection from source 112.85.42.237 has been denied by access-list TRUSTED-NETWORKS. Rejecting connection.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2019 00:35:10 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88659#M21038</guid>
      <dc:creator>Alex_Z</dc:creator>
      <dc:date>2019-12-03T00:35:10Z</dc:date>
    </item>
    <item>
      <title>Re: SSH port is still opened for network scanners. (ACL)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88660#M21039</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;So this ACL is working normally.&lt;BR /&gt; Because it’s block SSH access to switch from untrusted IP’s.&lt;/P&gt; &lt;P&gt;If you want block all SSH traffic from untrusted IP’s you have to map this ACL not to access-profile but to inbound port or vlan. (In this case ACL will be checking packet for combinations IP/port and if it from untrusted IP with port 22 switch will block this packet).&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="ea64e3cab39f430588ec62224d38610b_e20b746c-6b73-4789-9ee3-aa35b93f990e.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/3242i90639C2292F2D14D/image-size/large?v=v2&amp;amp;px=999" role="button" title="ea64e3cab39f430588ec62224d38610b_e20b746c-6b73-4789-9ee3-aa35b93f990e.png" alt="ea64e3cab39f430588ec62224d38610b_e20b746c-6b73-4789-9ee3-aa35b93f990e.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;Thank you!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2019 16:02:21 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88660#M21039</guid>
      <dc:creator>Alexandr_P</dc:creator>
      <dc:date>2019-12-03T16:02:21Z</dc:date>
    </item>
    <item>
      <title>Re: SSH port is still opened for network scanners. (ACL)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88661#M21040</link>
      <description>&lt;P&gt;Thanks, it works.&lt;BR /&gt; I have applied access-profile to VLAN.&lt;BR /&gt; As I understand, it is impossible to apply the access-profile to the L3 subinterface (SVI in Cisco terms) of VLAN. Only to the whole L2 VLAN. Correct ?&lt;BR /&gt; And I have forced to change POLICY_NAME file.&lt;BR /&gt; When the file has been mapped to the ssh2 access-profile I could use a multiply source-address in IF construction. For example :&lt;BR /&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; if match any {&lt;BR /&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; source-address 82.144.x.x/26 ;&lt;BR /&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; source-address 77.120.x.x/26 ;&lt;BR /&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; }&lt;BR /&gt; And It was Ok.&lt;BR /&gt; But when the file had &amp;nbsp;been mapped to VLAN the error appeared:&lt;BR /&gt; Line 4 : Attribute source-address already exists as a match statement in Acl entry ...&lt;BR /&gt; And I needed to create a separate entry for each source-address.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2019 18:22:14 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88661#M21040</guid>
      <dc:creator>Alex_Z</dc:creator>
      <dc:date>2019-12-03T18:22:14Z</dc:date>
    </item>
    <item>
      <title>Re: SSH port is still opened for network scanners. (ACL)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88662#M21041</link>
      <description>&lt;P&gt;SVI - it’s simple VLAN. In case of EXOS - all configurations&amp;nbsp;are&amp;nbsp;vlan-based. So if you have VLAN with IP, then you can map your ACL to VLAN and it would be like ACL for L3&amp;nbsp;subinterface.&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;access-profile is for snmp, telnet, ssh2 - for manage access to switch. (for example #configure ssh2 access-profile TRUSTED-NETWORKS)&amp;nbsp;&lt;/P&gt; &lt;P&gt;configure access-list - it’s packet inspection (for example #configure access-list [any | ports &amp;lt; portlist &amp;gt; | vlan &amp;lt; vlanname &amp;gt;] ) - it’s static ACL.&lt;/P&gt; &lt;P&gt;Also you can create dynamic ACL (for example #create access-list UNTRUSTED-NETWORKS «source-address 82.144.x.x/26&amp;nbsp; ;» «deny» →&amp;nbsp;#conf access-list add UNTRUSTED-NETWORKS ports 11-21 ingress )&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;About “error appeared:” -&amp;nbsp;&lt;A href="https://gtacknowledge.extremenetworks.com/articles/Solution/Summit-reports-error-when-applying-ACL-to-VLAN/?q=Attribute+source-address+already+exists+as+a+match+statement&amp;amp;l=en_US&amp;amp;fs=Search&amp;amp;pn=1" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/Solution/Summit-reports-error-when-applying-ACL-to-VLAN/?q=Attribute+source-address+already+exists+as+a+match+statement&amp;amp;l=en_US&amp;amp;fs=Search&amp;amp;pn=1&lt;/A&gt;&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;Thank you!&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2019 18:51:32 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88662#M21041</guid>
      <dc:creator>Alexandr_P</dc:creator>
      <dc:date>2019-12-03T18:51:32Z</dc:date>
    </item>
    <item>
      <title>Re: SSH port is still opened for network scanners. (ACL)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88663#M21042</link>
      <description>&lt;BLOCKQUOTE&gt; &lt;P&gt;SVI - it’s simple VLAN. In case of EXOS - all configurations&amp;nbsp;are&amp;nbsp;vlan-based. So if you have VLAN with IP, then you can map your ACL to VLAN and it would be like ACL for L3&amp;nbsp;subinterface.&lt;/P&gt; &lt;/BLOCKQUOTE&gt; &lt;P&gt;Yeah, but unlike of Cisco, ACL is mapped to all ports which contain this VLAN. In my case, it isn't a problem, &amp;nbsp;but in other ones, it may be some nuances.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2019 19:14:25 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88663#M21042</guid>
      <dc:creator>Alex_Z</dc:creator>
      <dc:date>2019-12-03T19:14:25Z</dc:date>
    </item>
    <item>
      <title>Re: SSH port is still opened for network scanners. (ACL)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88664#M21043</link>
      <description>&lt;P&gt;Could you tell task more detailed?&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;If we talking about mgmt access to switch - then by security principles you have to ban all IP’s except few trusted. And map it to vlan and/or ports. Here is no need for SVI-based ACL.&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;Thank you!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2019 19:23:48 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88664#M21043</guid>
      <dc:creator>Alexandr_P</dc:creator>
      <dc:date>2019-12-03T19:23:48Z</dc:date>
    </item>
    <item>
      <title>Re: SSH port is still opened for network scanners. (ACL)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88665#M21044</link>
      <description>&lt;P&gt;It is a little bit strange implementation.&lt;BR /&gt; To completely hide SSH service from untrusted hosts, it demands to apply an access-profile to SSH and also to apply ACL to VLAN. If we have one L3 interface it is Ok. &amp;nbsp;But if your switch has two or more L3 interfaces with the white IP it becomes not convenient to apply ACL to each L3 VLAN interface.&amp;nbsp;&lt;BR /&gt; It is only my opinion.&lt;/P&gt; &lt;P&gt;So, now the issue about applying ACL to VLAN.&lt;BR /&gt; When I applied ACL to VLAN it was normal about half an hour.&lt;BR /&gt; After that time the switch's IP became unreachable. And I lost SSH to it.&lt;BR /&gt; After turning off ACL and turning on the situation repeated.&lt;BR /&gt; What can be the cause of this behaviour?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Dec 2019 20:22:31 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88665#M21044</guid>
      <dc:creator>Alex_Z</dc:creator>
      <dc:date>2019-12-05T20:22:31Z</dc:date>
    </item>
    <item>
      <title>Re: SSH port is still opened for network scanners. (ACL)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88666#M21045</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;Actually, I think both your questions have to be directed to GTAC.&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;First question (it’s just my guesses) - when we talking about management access (access-profile), it’s pointed to session (like flows) it’s mean that you block management session (it’s like in flow-based inspection few packets can be forwarded to destination).&lt;/P&gt; &lt;P&gt;When we talking about ACL-based packet processing it’s more to per packet inspection and switch inspect every packet and make decision on it (block or allow).&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;About second issue - you have to give more information. Is there some logs about this issue? IP became unreachable from where (it’s better to have scheme and configuration)?&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;Thank you!&amp;nbsp;&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Dec 2019 20:33:10 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/ssh-port-is-still-opened-for-network-scanners-acl/m-p/88666#M21045</guid>
      <dc:creator>Alexandr_P</dc:creator>
      <dc:date>2019-12-05T20:33:10Z</dc:date>
    </item>
  </channel>
</rss>

