<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block admin Access to AP7532 from VLAN 2 in ExtremeWireless (WiNG)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-wing/block-admin-access-to-ap7532-from-vlan-2/m-p/61419#M5462</link>
    <description>&lt;P&gt;Hi Phil,&lt;/P&gt;  &lt;P&gt;&amp;nbsp;&lt;/P&gt;  &lt;P&gt;ICMP I’d block with ACL as well.&lt;/P&gt;  &lt;P&gt;Regarding SSH, please see Management Policy in the GUI. You can enable/disable mgmt protocols and also add allowed IP subnets/hosts.&lt;/P&gt;  &lt;P&gt;&amp;nbsp;&lt;/P&gt;  &lt;P&gt;Hope that helps,&lt;/P&gt;  &lt;P&gt;Tomasz&lt;/P&gt;</description>
    <pubDate>Tue, 23 Jun 2020 18:09:20 GMT</pubDate>
    <dc:creator>Tomasz</dc:creator>
    <dc:date>2020-06-23T18:09:20Z</dc:date>
    <item>
      <title>Block admin Access to AP7532 from VLAN 2</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/block-admin-access-to-ap7532-from-vlan-2/m-p/61418#M5461</link>
      <description>&lt;P&gt;I have set an&amp;nbsp;AP up &amp;nbsp;&amp;nbsp;that has direct WAN connection&amp;nbsp; and uses NAT for the MU’s inside to get to the WAN outside with help from Tomasz ( thankyou &lt;span class="lia-inline-image-display-wrapper" image-alt="9f02c4bd5f894d4f84ef8db7f5eb9b91_1f44d.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/5935i2B395BAEA99A4961/image-size/large?v=v2&amp;amp;px=999" role="button" title="9f02c4bd5f894d4f84ef8db7f5eb9b91_1f44d.png" alt="9f02c4bd5f894d4f84ef8db7f5eb9b91_1f44d.png" /&gt;&lt;/span&gt; ) , However as soon as it connects the attempted access starts and port scans from all different IP’s and trying all sorts of usernames and passwords, So is it possible to remove access to SSH /HTTPS etc on VLAN 2 only and set it so the AP does not respond to ICMP on that VLAN to ?&lt;/P&gt;  &lt;P&gt;I have seen this as an example which will block everything else than IP protocol packet for destination IP address &lt;STRONG&gt;10.0.0.2, &lt;/STRONG&gt;But not sure this is what I need?&amp;nbsp;&lt;/P&gt;  &lt;P&gt;VX&amp;gt;&lt;BR /&gt; VX&amp;gt; &lt;STRONG&gt;enable&lt;/STRONG&gt;&lt;BR /&gt; VX# &lt;STRONG&gt;configure&lt;/STRONG&gt;&lt;BR /&gt; Enter configuration commands, one per line.&amp;nbsp; End with CNTL/Z.&lt;BR /&gt; VX(config)# &lt;STRONG&gt;ip access-list LIMIT-ALL&lt;/STRONG&gt;&lt;BR /&gt; VX(config-ip-acl-LIMIT-ALL)# &lt;STRONG&gt;permit ip any host 10.0.0.2 rule-precedence 10&lt;/STRONG&gt;&lt;BR /&gt; VX(config-ip-acl-LIMIT-ALL)# &lt;STRONG&gt;deny ip any any rule-precedence 15&lt;/STRONG&gt;&lt;BR /&gt; VX(config-ip-acl-LIMIT-ALL)# &lt;STRONG&gt;show context&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ip access-list LIMIT-ALL permit ip any host 10.0.0.2 rule-precedence 10 deny ip any any rule-precedence 15&lt;/STRONG&gt;&lt;BR /&gt; VX(config-ip-acl-LIMIT-ALL)# &lt;STRONG&gt;exit&lt;/STRONG&gt;&lt;BR /&gt; VX(config)#&lt;STRONG&gt;wlan LIMIT-ALL&lt;/STRONG&gt;&lt;BR /&gt; VX(config-wlan-LIMIT-ALL)# &lt;STRONG&gt;use ip-access-list in LIMIT-ALL &lt;/STRONG&gt;VX(config-wlan-LIMIT-ALL)#&amp;nbsp;&lt;STRONG&gt;commit write&lt;/STRONG&gt;&lt;/P&gt;  &lt;P&gt;access to &amp;nbsp;the AP via CLI port on the AP can be done is local but would still like to access via HTTPS from Vlan 100 which is inside ( NAT)&lt;/P&gt;  &lt;P&gt;Phil&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jun 2020 20:54:03 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/block-admin-access-to-ap7532-from-vlan-2/m-p/61418#M5461</guid>
      <dc:creator>Phil_storey</dc:creator>
      <dc:date>2020-06-10T20:54:03Z</dc:date>
    </item>
    <item>
      <title>Re: Block admin Access to AP7532 from VLAN 2</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/block-admin-access-to-ap7532-from-vlan-2/m-p/61419#M5462</link>
      <description>&lt;P&gt;Hi Phil,&lt;/P&gt;  &lt;P&gt;&amp;nbsp;&lt;/P&gt;  &lt;P&gt;ICMP I’d block with ACL as well.&lt;/P&gt;  &lt;P&gt;Regarding SSH, please see Management Policy in the GUI. You can enable/disable mgmt protocols and also add allowed IP subnets/hosts.&lt;/P&gt;  &lt;P&gt;&amp;nbsp;&lt;/P&gt;  &lt;P&gt;Hope that helps,&lt;/P&gt;  &lt;P&gt;Tomasz&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jun 2020 18:09:20 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/block-admin-access-to-ap7532-from-vlan-2/m-p/61419#M5462</guid>
      <dc:creator>Tomasz</dc:creator>
      <dc:date>2020-06-23T18:09:20Z</dc:date>
    </item>
    <item>
      <title>Re: Block admin Access to AP7532 from VLAN 2</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/block-admin-access-to-ap7532-from-vlan-2/m-p/61420#M5463</link>
      <description>&lt;P&gt;Phil,&lt;/P&gt;  &lt;P&gt;You need to attach the acl in MNG policy .&lt;/P&gt;  &lt;P&gt;Aviv&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 20:57:46 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/block-admin-access-to-ap7532-from-vlan-2/m-p/61420#M5463</guid>
      <dc:creator>Aviv_Kedem</dc:creator>
      <dc:date>2020-07-09T20:57:46Z</dc:date>
    </item>
  </channel>
</rss>

