<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH Access for Given User Restricted to IP Address in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ssh-access-for-given-user-restricted-to-ip-address/m-p/3344331#M549827</link>
    <description>&lt;P&gt;I do not believe this can be accomplished from just using IOS commands.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have something other than SSH enabled for an access method?&amp;nbsp;&amp;nbsp;Are you using some sort of external AAA server?&amp;nbsp; ACS or ISE?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Within IOS you&amp;nbsp;can&amp;nbsp;restrict device access to only be SSH (line vty), then in the external AAA server, setup an authentication rule that only allows TACACS/RADIUS (you didn't specify which) from a specific IP, then an&amp;nbsp;authorization rule to match a specific&amp;nbsp;userID.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 07 Mar 2018 19:37:17 GMT</pubDate>
    <dc:creator>jwillie3</dc:creator>
    <dc:date>2018-03-07T19:37:17Z</dc:date>
    <item>
      <title>SSH Access for Given User Restricted to IP Address</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-access-for-given-user-restricted-to-ip-address/m-p/3344205#M549826</link>
      <description>&lt;P&gt;I have a network management appliance that utilizes CLI access to my network devices to perform certain functions. For compliance and audit purposes, I would like to restrict the use of login credentials established for the appliance such that they can only be used if the SSH connection originates from a specific IP address.&amp;nbsp; Is it possible in IOS to limit the use of a particular set of creds so that only connections from a given IP can utilize them (and perhaps log any attempts from other addresses)?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:47:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-access-for-given-user-restricted-to-ip-address/m-p/3344205#M549826</guid>
      <dc:creator>njsanders1</dc:creator>
      <dc:date>2020-02-21T18:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Access for Given User Restricted to IP Address</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-access-for-given-user-restricted-to-ip-address/m-p/3344331#M549827</link>
      <description>&lt;P&gt;I do not believe this can be accomplished from just using IOS commands.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have something other than SSH enabled for an access method?&amp;nbsp;&amp;nbsp;Are you using some sort of external AAA server?&amp;nbsp; ACS or ISE?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Within IOS you&amp;nbsp;can&amp;nbsp;restrict device access to only be SSH (line vty), then in the external AAA server, setup an authentication rule that only allows TACACS/RADIUS (you didn't specify which) from a specific IP, then an&amp;nbsp;authorization rule to match a specific&amp;nbsp;userID.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Mar 2018 19:37:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-access-for-given-user-restricted-to-ip-address/m-p/3344331#M549827</guid>
      <dc:creator>jwillie3</dc:creator>
      <dc:date>2018-03-07T19:37:17Z</dc:date>
    </item>
  </channel>
</rss>

