Blocking SSH access to most layer 3 interfaces.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎12-08-2017 05:30 PM
The "configure ssh2 access-profile" command is gimped in that it only accepts "source-address" as a match condition in its ACL.
Is my only option here to create an ACL that blocks ssh to each IP address on the switch explicitly, then apply that to each VLAN interface?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎12-09-2017 04:51 PM
you might be able to use a separate virtual router for the management IP, and then restrict SSH (and other management protocols) to use only that virtual router.
Another possiblity is to bind an ACL (e.g. a .pol file) to any port&VLAN, and deny SSH traffic to all IP interfaces configured on the layer 3 switch except the one you want to use for SSH access.
Thanks,
Erik
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎12-09-2017 04:51 PM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎04-07-2025 04:45 PM
How did you do this exactly? Did you have separate entries for each interface you wanted to block?
Does anyone know if we can we use logical OR's in ACL entries? Like this:
entry deny_ssh2interfaces {
if match all {
source-address 10.0.0.0/8;
destination-address 10.99.17.17/32 || destination-address 10.99.17.33/32;
destination-port 22;
} then {
deny;
}
}
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎12-08-2017 05:36 PM
