<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to restrict access to FTD management interface. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4470899#M1083875</link>
    <description>&lt;P&gt;That's the proper command. There was a bug with it back in 6.2.x but that should be fixed on 6.7 and 7.0&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCve55973/?rfs=iqvred" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCve55973/?rfs=iqvred&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tested it on my device and it appears to work as expected (prevented me from accessing the device from a non-10.0.0.0/8 address):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ssh-access-list.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/131652i474473E3ED3794D1/image-size/large?v=v2&amp;amp;px=999" role="button" title="ssh-access-list.PNG" alt="ssh-access-list.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 21 Sep 2021 17:36:13 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2021-09-21T17:36:13Z</dc:date>
    <item>
      <title>How to restrict access to FTD management interface.</title>
      <link>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4470860#M1083874</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am trying to restrict SSH access to the management interface of the FTD device.&lt;/P&gt;&lt;P&gt;Can someone share the correct procedure?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Platform settings apply only to the data interfaces and the management interface is still accessible.&lt;/P&gt;&lt;P&gt;I tried applying ssh access list from CLISH but that did not work either and the device is still accessible from any IP.&lt;/P&gt;&lt;PRE&gt;  &amp;gt; configure ssh-access-list 10.0.0.0/8&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;We are running FXOS version 6.7 on FTD 2110 managed by FMC on version 7.0&lt;/P&gt;</description>
      <pubDate>Tue, 21 Sep 2021 16:12:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4470860#M1083874</guid>
      <dc:creator>Grzegorz86</dc:creator>
      <dc:date>2021-09-21T16:12:16Z</dc:date>
    </item>
    <item>
      <title>Re: How to restrict access to FTD management interface.</title>
      <link>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4470899#M1083875</link>
      <description>&lt;P&gt;That's the proper command. There was a bug with it back in 6.2.x but that should be fixed on 6.7 and 7.0&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCve55973/?rfs=iqvred" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCve55973/?rfs=iqvred&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tested it on my device and it appears to work as expected (prevented me from accessing the device from a non-10.0.0.0/8 address):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ssh-access-list.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/131652i474473E3ED3794D1/image-size/large?v=v2&amp;amp;px=999" role="button" title="ssh-access-list.PNG" alt="ssh-access-list.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Sep 2021 17:36:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4470899#M1083875</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-09-21T17:36:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to restrict access to FTD management interface.</title>
      <link>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4470971#M1083878</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;Thank you for your reply.&lt;/P&gt;&lt;P&gt;I just did some more checks and can see that my ACL is applied. However, I have two permit any any statements at the beginning and the end of ACL. Please see redacted entries below.&amp;nbsp;&lt;/P&gt;&lt;P&gt;show ssh-access-list&lt;BR /&gt;ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp -- ---- anywhere state NEW tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp -- --- anywhere state NEW tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp -- --- anywhere state NEW tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp -- ---- anywhere state NEW tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp anywhere anywhere state NEW tcp dpt:ssh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can I modify it to get rid of the any any statements?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Sep 2021 19:30:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4470971#M1083878</guid>
      <dc:creator>Grzegorz86</dc:creator>
      <dc:date>2021-09-21T19:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to restrict access to FTD management interface.</title>
      <link>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4470987#M1083881</link>
      <description>&lt;P&gt;You should be able to enter a replacement with just the networks you want:&lt;/P&gt;
&lt;PRE&gt;configure ssh-access-list &amp;lt;entry_1&amp;gt;,&amp;lt;entry_2&amp;gt;,&amp;lt;entry_n&amp;gt;&lt;/PRE&gt;
&lt;P&gt;That will replace the existing entries.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Sep 2021 20:03:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4470987#M1083881</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-09-21T20:03:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to restrict access to FTD management interface.</title>
      <link>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4471019#M1083883</link>
      <description>That's what I did.&lt;BR /&gt;I configured acl in the format&lt;BR /&gt;&lt;BR /&gt;Configure ssh-access-list 10.1.1.0/24,10.2.0.0/24,172.16.0.0/16&lt;BR /&gt;&lt;BR /&gt;Unfortunately, permit any any entries are still retained.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 21 Sep 2021 21:37:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4471019#M1083883</guid>
      <dc:creator>Grzegorz86</dc:creator>
      <dc:date>2021-09-21T21:37:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to restrict access to FTD management interface.</title>
      <link>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4471311#M1083896</link>
      <description>&lt;P&gt;&amp;nbsp;I tested on my system it worked as I described. See my output below:&lt;/P&gt;
&lt;PRE&gt;&amp;gt; configure ssh-access-list 10.0.0.0/8

The ssh access list was changed successfully.

&amp;gt; show ssh-access-list
ACCEPT     tcp  --  10.0.0.0/8           anywhere             state NEW tcp dpt:ssh
&amp;gt; 
&amp;gt; configure ssh-access-list 10.0.0.0/8,172.16.0.0/12

The ssh access list was changed successfully.

&amp;gt; show ssh-access-list
ACCEPT     tcp  --  10.0.0.0/8           anywhere             state NEW tcp dpt:ssh
ACCEPT     tcp  --  172.16.0.0/12        anywhere             state NEW tcp dpt:ssh
&amp;gt; 
&amp;gt; configure ssh-access-list 172.16.0.0/12

The ssh access list was changed successfully.

&amp;gt; show ssh-access-list
ACCEPT     tcp  --  172.16.0.0/12        anywhere             state NEW tcp dpt:ssh
&amp;gt; 
&lt;/PRE&gt;</description>
      <pubDate>Wed, 22 Sep 2021 12:38:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4471311#M1083896</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-09-22T12:38:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to restrict access to FTD management interface.</title>
      <link>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4471321#M1083899</link>
      <description>&lt;P&gt;Thanks, Marvin&lt;/P&gt;&lt;P&gt;It does not work for me in production.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It works fine in the lab but I am using a different version there.&lt;/P&gt;&lt;P&gt;When I configure ACL it does not remove entries but just duplicates them and add to the bottom of the ACL&lt;/P&gt;&lt;P&gt;Another thing is I cannot even disable ssh access completely.&lt;/P&gt;&lt;P&gt;After issuing &lt;STRONG&gt;configure disable-ssh-access &lt;/STRONG&gt;access is still there and ACL is not being removed.&lt;/P&gt;&lt;P&gt;It disappears from the config and ssh access is restricted as expected when I test in LAB.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I must be hitting some bug and will raise that with cisco.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Sep 2021 12:48:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4471321#M1083899</guid>
      <dc:creator>Grzegorz86</dc:creator>
      <dc:date>2021-09-22T12:48:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to restrict access to FTD management interface.</title>
      <link>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4477528#M1084091</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I thought I will share the update for anyone who has the same issue.&lt;/P&gt;&lt;P&gt;Basically, we were hitting the below bug.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CSCvx71156&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;- access list is not working on 6.7&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx71156" target="_blank" rel="noopener noreferrer"&gt;https://bst.cloudapps.&lt;SPAN class="mark285uehngt"&gt;cisco&lt;/SPAN&gt;.com/bugsearch/bug/CSCvx71156&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Cisco TAC came up with a workaround involving logging in to expert mode, a manual edition of iptables and iptables service restart afterwards.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This fixed the problem and we were able to restrict access as required.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 09:34:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4477528#M1084091</guid>
      <dc:creator>Grzegorz86</dc:creator>
      <dc:date>2021-09-30T09:34:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to restrict access to FTD management interface.</title>
      <link>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4477911#M1084131</link>
      <description>&lt;P&gt;Thanks for the update - I hadn't encountered that bug before.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 18:43:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-restrict-access-to-ftd-management-interface/m-p/4477911#M1084131</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-09-30T18:43:41Z</dc:date>
    </item>
  </channel>
</rss>

