<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: deny ssh access from a specific internet facing port in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39195#M8600</link>
    <description>For this external switch ( internet one side , firewall the other ) we are using vr vr-default ..&lt;BR /&gt;
Thought the ip address of the switch for management is on vr-mgmt ..&lt;BR /&gt;
&lt;BR /&gt;
So basically &lt;BR /&gt;
I would disable ssh2 vr vr-default , enable ssh2 vr vr-mgmt .. &lt;BR /&gt;
That should stop the external hits we are getting for ssh..&lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Tue, 08 Nov 2016 21:07:00 GMT</pubDate>
    <dc:creator>Rod_Robertson2</dc:creator>
    <dc:date>2016-11-08T21:07:00Z</dc:date>
    <item>
      <title>deny ssh access from a specific internet facing port</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39191#M8596</link>
      <description>I need to deny any SSH access ( switch management )  from a specific port that the internet is connected to the internet . ( basically i want to stop any response from the switch from an specific port &lt;BR /&gt;
&lt;BR /&gt;
The Switch still needs to be ssh accessible from the internal secure network.&lt;BR /&gt;
&lt;BR /&gt;
I already run a Switch Manage policy for SSH/TELNET/and web. which are working as expected.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 08 Nov 2016 20:40:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39191#M8596</guid>
      <dc:creator>Rod_Robertson2</dc:creator>
      <dc:date>2016-11-08T20:40:00Z</dc:date>
    </item>
    <item>
      <title>RE: deny ssh access from a specific internet facing port</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39192#M8597</link>
      <description>What is the device / product type your working with, and what firmware revision?</description>
      <pubDate>Tue, 08 Nov 2016 20:41:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39192#M8597</guid>
      <dc:creator>Mike_Thomas</dc:creator>
      <dc:date>2016-11-08T20:41:00Z</dc:date>
    </item>
    <item>
      <title>RE: deny ssh access from a specific internet facing port</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39193#M8598</link>
      <description>X670-48X 15.3.3.5-patch1-2&lt;BR /&gt;
&lt;BR /&gt;
I really want to stop any response at all (BANNER etc ) ... other than the log</description>
      <pubDate>Tue, 08 Nov 2016 20:55:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39193#M8598</guid>
      <dc:creator>Rod_Robertson2</dc:creator>
      <dc:date>2016-11-08T20:55:00Z</dc:date>
    </item>
    <item>
      <title>RE: deny ssh access from a specific internet facing port</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39194#M8599</link>
      <description>If the Internet is on a different VR than your internal network, you can limit ssh to only listen on a VR - for instance "enable ssh2 vr VR-Mgmt" to only listen on the management port/vr&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 08 Nov 2016 21:07:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39194#M8599</guid>
      <dc:creator>Frank</dc:creator>
      <dc:date>2016-11-08T21:07:00Z</dc:date>
    </item>
    <item>
      <title>RE: deny ssh access from a specific internet facing port</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39195#M8600</link>
      <description>For this external switch ( internet one side , firewall the other ) we are using vr vr-default ..&lt;BR /&gt;
Thought the ip address of the switch for management is on vr-mgmt ..&lt;BR /&gt;
&lt;BR /&gt;
So basically &lt;BR /&gt;
I would disable ssh2 vr vr-default , enable ssh2 vr vr-mgmt .. &lt;BR /&gt;
That should stop the external hits we are getting for ssh..&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 08 Nov 2016 21:07:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39195#M8600</guid>
      <dc:creator>Rod_Robertson2</dc:creator>
      <dc:date>2016-11-08T21:07:00Z</dc:date>
    </item>
    <item>
      <title>RE: deny ssh access from a specific internet facing port</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39196#M8601</link>
      <description>My memory is spotty - I would start saying "enable ssh2 vr vr-mgmt" and see if that took it off vr-default. Don't want to leave you hanging without ssh or a long console cable.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 08 Nov 2016 21:07:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39196#M8601</guid>
      <dc:creator>Frank</dc:creator>
      <dc:date>2016-11-08T21:07:00Z</dc:date>
    </item>
    <item>
      <title>RE: deny ssh access from a specific internet facing port</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39197#M8602</link>
      <description>Rod, take a look at this article:&lt;BR /&gt;
&lt;A href="https://gtacknowledge.extremenetworks.com/articles/Q_A/SSH-Access-Profile" target="_blank" rel="nofollow noreferrer noopener"&gt;How do you restrict SSH access to an IP addresses range?&lt;/A&gt; &lt;BR /&gt;</description>
      <pubDate>Tue, 08 Nov 2016 21:14:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39197#M8602</guid>
      <dc:creator>Drew_C</dc:creator>
      <dc:date>2016-11-08T21:14:00Z</dc:date>
    </item>
    <item>
      <title>RE: deny ssh access from a specific internet facing port</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39198#M8603</link>
      <description>Drew&lt;BR /&gt;
&lt;BR /&gt;
We already do this and it works , we limit what internal  networks and specific  IP addresses can access the switch , on SSH2 , telnet and SNMP .what I want to stop , is any response from the switch to the external addresses that are trying to access the switch IP  via SSH2 ( janet address ). Currently the extrenal users ( lets call them hackers ) still receive an SSH2 prompt to sigh on ..I need this to stop ..</description>
      <pubDate>Tue, 08 Nov 2016 21:14:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39198#M8603</guid>
      <dc:creator>Rod_Robertson2</dc:creator>
      <dc:date>2016-11-08T21:14:00Z</dc:date>
    </item>
    <item>
      <title>RE: deny ssh access from a specific internet facing port</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39199#M8604</link>
      <description>What if you add an ingress ACL on that port that deny traffic to the switch IP and only allow the needed connections ( BGP peers etc..)&lt;BR /&gt;</description>
      <pubDate>Tue, 08 Nov 2016 21:14:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39199#M8604</guid>
      <dc:creator>Ron_Huygens</dc:creator>
      <dc:date>2016-11-08T21:14:00Z</dc:date>
    </item>
    <item>
      <title>RE: deny ssh access from a specific internet facing port</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39200#M8605</link>
      <description>Thanks for all your input .. I'm going for franks option , in disabling ssh2 on the vr-default , and enable on Vr-mgmt so internally w e can get to the switch , externally hopefully they ( alleged hackers ) get no response what so ever , so in future they have nothing to help there attack.&lt;BR /&gt;
&lt;BR /&gt;
Basically I need to test this before I suggest this to my customer ..&lt;BR /&gt;
&lt;BR /&gt;
Many thanks everyone..&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 08 Nov 2016 21:14:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/deny-ssh-access-from-a-specific-internet-facing-port/m-p/39200#M8605</guid>
      <dc:creator>Rod_Robertson2</dc:creator>
      <dc:date>2016-11-08T21:14:00Z</dc:date>
    </item>
  </channel>
</rss>

