cancel
Showing results for 
Search instead for 
Did you mean: 

Block admin Access to AP7532 from VLAN 2

Block admin Access to AP7532 from VLAN 2

Phil_storey
Contributor

I have set an AP up   that has direct WAN connection  and uses NAT for the MU’s inside to get to the WAN outside with help from Tomasz ( thankyou 9f02c4bd5f894d4f84ef8db7f5eb9b91_1f44d.png ) , However as soon as it connects the attempted access starts and port scans from all different IP’s and trying all sorts of usernames and passwords, So is it possible to remove access to SSH /HTTPS etc on VLAN 2 only and set it so the AP does not respond to ICMP on that VLAN to ?

I have seen this as an example which will block everything else than IP protocol packet for destination IP address 10.0.0.2, But not sure this is what I need? 

VX>
VX> enable
VX# configure
Enter configuration commands, one per line.  End with CNTL/Z.
VX(config)# ip access-list LIMIT-ALL
VX(config-ip-acl-LIMIT-ALL)# permit ip any host 10.0.0.2 rule-precedence 10
VX(config-ip-acl-LIMIT-ALL)# deny ip any any rule-precedence 15
VX(config-ip-acl-LIMIT-ALL)# show context
ip access-list LIMIT-ALL permit ip any host 10.0.0.2 rule-precedence 10 deny ip any any rule-precedence 15
VX(config-ip-acl-LIMIT-ALL)# exit
VX(config)#wlan LIMIT-ALL
VX(config-wlan-LIMIT-ALL)# use ip-access-list in LIMIT-ALL VX(config-wlan-LIMIT-ALL)# commit write

access to  the AP via CLI port on the AP can be done is local but would still like to access via HTTPS from Vlan 100 which is inside ( NAT)

Phil

2 REPLIES 2

Aviv_Kedem
Contributor

Phil,

You need to attach the acl in MNG policy .

Aviv 

Tomasz
Valued Contributor II

Hi Phil,

 

ICMP I’d block with ACL as well.

Regarding SSH, please see Management Policy in the GUI. You can enable/disable mgmt protocols and also add allowed IP subnets/hosts.

 

Hope that helps,

Tomasz

GTM-P2G8KFN