<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH problem in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872618#M582837</link>
    <description>&lt;P&gt;Login local&lt;/P&gt;
&lt;P&gt;Do you conifg&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Username xxxx password yyyy ?&lt;/P&gt;</description>
    <pubDate>Wed, 12 Jul 2023 15:36:56 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-07-12T15:36:56Z</dc:date>
    <item>
      <title>SSH problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872426#M582820</link>
      <description>&lt;P&gt;Hi.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i have added an ACL to allow certian IPs to the managment Vlan.&amp;nbsp; Upon adding this ACL i can ssh to the device but get an access denied. upon removing the ACL works fine&lt;/P&gt;
&lt;P&gt;here is the config- some sensitive details removed&lt;/P&gt;
&lt;P&gt;interface Vlan200&lt;BR /&gt;description ***Management***&lt;BR /&gt;ip address 192.168.68.2 255.255.255.0&lt;BR /&gt;ip access-group ACL_MGMT_in in&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 192.168.68.1&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;no ip http server&lt;BR /&gt;ip http authentication local&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;ip ssh time-out 60&lt;BR /&gt;ip ssh logging events&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended ACL_MGMT_in&lt;BR /&gt;10 permit ip host 192.168.150.100 any&lt;BR /&gt;20 permit ip host 192.168.150.101 any&lt;BR /&gt;30 permit ip host 192.168.150.102 any&lt;BR /&gt;40 permit ip host 192.168.150.103 any&lt;BR /&gt;50 permit ip host 192.168.150.104 any&lt;BR /&gt;60 permit ip host 192.168.150.105 any&lt;BR /&gt;70 permit ip host 192.168.152.20 any&lt;BR /&gt;80 permit ip 192.168.68.0 0.0.0.255 any&lt;BR /&gt;90 deny ip any any&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;service-policy input system-cpp-policy&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt;exec-timeout 60 0&lt;BR /&gt;privilege level 15&lt;BR /&gt;transport input all&lt;BR /&gt;line vty 5 15&lt;BR /&gt;exec-timeout 60 0&lt;BR /&gt;privilege level 15&lt;BR /&gt;transport input all&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2023 10:07:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872426#M582820</guid>
      <dc:creator>ashahnawaz</dc:creator>
      <dc:date>2023-07-12T10:07:32Z</dc:date>
    </item>
    <item>
      <title>Re: SSH problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872513#M582826</link>
      <description>&lt;P&gt;Not sure on the exact issue, we apply the ACL to the VTY.&lt;/P&gt;&lt;P&gt;line vty 0 15&lt;BR /&gt;length 54&lt;BR /&gt;logging synchronous&lt;BR /&gt;exec-timeout 15&lt;BR /&gt;transport input ssh&lt;BR /&gt;access-class 10 in vrf-also&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2023 13:10:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872513#M582826</guid>
      <dc:creator>Dustin Anderson</dc:creator>
      <dc:date>2023-07-12T13:10:30Z</dc:date>
    </item>
    <item>
      <title>Re: SSH problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872529#M582828</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1490193"&gt;@ashahnawaz&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ACL applied to Interface vlan does not block traffic send to the device CPU like SSH (Management traffic).&amp;nbsp; You need to apply the ACL on the line vty&lt;/P&gt;
&lt;P&gt;line vty 0 4&lt;/P&gt;
&lt;P&gt;&amp;nbsp;access-class&amp;nbsp; ACL_MGMT_in&amp;nbsp; in&lt;/P&gt;
&lt;P&gt;If the switch does not accept named ACL create a numbered ACL&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip access-list extended 100&lt;BR /&gt;10 permit ip host 192.168.150.100 any&lt;BR /&gt;20 permit ip host 192.168.150.101 any&lt;BR /&gt;30 permit ip host 192.168.150.102 any&lt;BR /&gt;40 permit ip host 192.168.150.103 any&lt;BR /&gt;50 permit ip host 192.168.150.104 any&lt;BR /&gt;60 permit ip host 192.168.150.105 any&lt;BR /&gt;70 permit ip host 192.168.152.20 any&lt;BR /&gt;80 permit ip 192.168.68.0 0.0.0.255 any&lt;BR /&gt;90 deny ip any any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;line vty 0 4&lt;/P&gt;
&lt;P&gt;&amp;nbsp;access-class&amp;nbsp; 100 &amp;nbsp; in&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2023 13:29:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872529#M582828</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-07-12T13:29:56Z</dc:date>
    </item>
    <item>
      <title>Re: SSH problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872535#M582829</link>
      <description>&lt;P&gt;Hello thanks for the reply.&lt;/P&gt;
&lt;P&gt;I forgot to mention this config is on the Core Switch on x.x.68.2. if i try to SSH to x.x.68.3 i get to the splash page however the password is not accepted( Access Denied).&amp;nbsp; Removing ACL from the interface on the CORE allows me in.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2023 13:39:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872535#M582829</guid>
      <dc:creator>ashahnawaz</dc:creator>
      <dc:date>2023-07-12T13:39:23Z</dc:date>
    </item>
    <item>
      <title>Re: SSH problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872563#M582831</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Which device is x.x.68.3 ?&amp;nbsp; Are you using TACACS ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2023 14:04:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872563#M582831</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-07-12T14:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: SSH problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872607#M582835</link>
      <description>&lt;P&gt;Use&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ip tacacs source-interface &lt;STRONG&gt;vlan200&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2023 15:25:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872607#M582835</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-12T15:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSH problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872609#M582836</link>
      <description>&lt;P&gt;Core is a 9500 on 68.2.&lt;/P&gt;
&lt;P&gt;68.3 is a C9200L&lt;/P&gt;
&lt;P&gt;we are using local Login&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2023 15:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872609#M582836</guid>
      <dc:creator>ashahnawaz</dc:creator>
      <dc:date>2023-07-12T15:28:15Z</dc:date>
    </item>
    <item>
      <title>Re: SSH problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872618#M582837</link>
      <description>&lt;P&gt;Login local&lt;/P&gt;
&lt;P&gt;Do you conifg&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Username xxxx password yyyy ?&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2023 15:36:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872618#M582837</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-12T15:36:56Z</dc:date>
    </item>
    <item>
      <title>Re: SSH problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872642#M582839</link>
      <description>&lt;P&gt;Her is the User config&lt;/P&gt;
&lt;P&gt;version 17.6&lt;BR /&gt;service tcp-keepalives-in&lt;BR /&gt;service tcp-keepalives-out&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;service sequence-numbers&lt;BR /&gt;service call-home&lt;BR /&gt;service unsupported-transceiver&lt;BR /&gt;platform punt-keepalive disable-kernel-core&lt;BR /&gt;!&lt;BR /&gt;hostname Core&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;vrf definition Mgmt-vrf&lt;BR /&gt;!&lt;BR /&gt;address-family ipv4&lt;BR /&gt;exit-address-family&lt;BR /&gt;!&lt;BR /&gt;address-family ipv6&lt;BR /&gt;exit-address-family&lt;BR /&gt;!&lt;BR /&gt;no logging console&lt;BR /&gt;enable secret 9 XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default local&lt;BR /&gt;aaa authentication enable default enable&lt;BR /&gt;aaa authorization console&lt;BR /&gt;aaa authorization exec default local&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;clock timezone GMT 0 0&lt;BR /&gt;clock summer-time BST recurring last Sun Mar 1:00 last Sun Oct 2:00&lt;BR /&gt;switch 1 provision c9500-16x&lt;BR /&gt;switch 2 provision c9500-16x&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;stackwise-virtual&lt;BR /&gt;domain 1&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;login on-success log&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;vtp domain Test.Local&lt;BR /&gt;vtp mode transparent&lt;BR /&gt;udld aggressive&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;license boot level network-advantage addon dna-advantage&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;diagnostic bootup level minimal&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode rapid-pvst&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;spanning-tree vlan 100-106,200,998-999 priority 4096&lt;BR /&gt;memory free low-watermark processor 133114&lt;BR /&gt;!&lt;BR /&gt;errdisable recovery cause udld&lt;BR /&gt;errdisable recovery cause bpduguard&lt;BR /&gt;errdisable recovery cause security-violation&lt;BR /&gt;errdisable recovery cause pagp-flap&lt;BR /&gt;errdisable recovery cause dtp-flap&lt;BR /&gt;errdisable recovery cause link-flap&lt;BR /&gt;errdisable recovery cause sfp-config-mismatch&lt;BR /&gt;errdisable recovery cause gbic-invalid&lt;BR /&gt;errdisable recovery cause psecure-violation&lt;BR /&gt;errdisable recovery cause port-mode-failure&lt;BR /&gt;errdisable recovery cause dhcp-rate-limit&lt;BR /&gt;errdisable recovery cause mac-limit&lt;BR /&gt;errdisable recovery cause storm-control&lt;BR /&gt;errdisable recovery cause inline-power&lt;BR /&gt;errdisable recovery cause loopback&lt;BR /&gt;errdisable recovery interval 30&lt;BR /&gt;username Redacted privilege 15 secret 9 XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX&lt;BR /&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt;mode sso&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2023 16:11:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-problem/m-p/4872642#M582839</guid>
      <dc:creator>ashahnawaz</dc:creator>
      <dc:date>2023-07-12T16:11:23Z</dc:date>
    </item>
  </channel>
</rss>

