<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ssh access to Layer 3 specific interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-access-to-layer-3-specific-interface/m-p/3359226#M903052</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;By default, your device answer ssh connections from all the interfaces VLAN, you can restrict that by using ACL that prohibits incoming SSH in the interfaces you want to&lt;/P&gt;</description>
    <pubDate>Mon, 02 Apr 2018 19:59:59 GMT</pubDate>
    <dc:creator>EduardR</dc:creator>
    <dc:date>2018-04-02T19:59:59Z</dc:date>
    <item>
      <title>ssh access to Layer 3 specific interface</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-layer-3-specific-interface/m-p/3359203#M903051</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am just reviewing one of our L3 cisco router and I am seeing there are 4 different VLAN interfaces configured with IP addresses (wireless , Data , Video , Management ) when I do ssh to this switch from my desktop I am able to use any of these IP addresses on the switch and ssh works fine . MY concern is if this is a security issue or is there any other way we can only ssh to certain IP address on the switch for security concern ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:35:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-layer-3-specific-interface/m-p/3359203#M903051</guid>
      <dc:creator>cyberops123</dc:creator>
      <dc:date>2020-02-21T15:35:27Z</dc:date>
    </item>
    <item>
      <title>Re: ssh access to Layer 3 specific interface</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-layer-3-specific-interface/m-p/3359226#M903052</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;By default, your device answer ssh connections from all the interfaces VLAN, you can restrict that by using ACL that prohibits incoming SSH in the interfaces you want to&lt;/P&gt;</description>
      <pubDate>Mon, 02 Apr 2018 19:59:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-layer-3-specific-interface/m-p/3359226#M903052</guid>
      <dc:creator>EduardR</dc:creator>
      <dc:date>2018-04-02T19:59:59Z</dc:date>
    </item>
    <item>
      <title>Re: ssh access to Layer 3 specific interface</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-layer-3-specific-interface/m-p/3359237#M903053</link>
      <description>&lt;P&gt;well only ACL for ssh I know is basically specifying individual hosts or networks that can access to my device and apply in under line vty connection&amp;nbsp; . for example below is my current ssh configuration&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list 100 permit ip 10.1.x.0 0.0.255.255 any &lt;BR /&gt;access-list 100 permit ip 10.x.x.0 0.0.0.255 any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;line vty 0 4 &lt;BR /&gt;access-class 100 in &lt;BR /&gt;exec-timeout 9 0 &lt;BR /&gt;transport input ssh&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so as far as I know this will give access to those networks below to my network device . but I want to to use only one of the SVI interfaces for ssh , if there is any ssh attempt o other SVIs it should be denied .&lt;/P&gt;
&lt;P&gt;currently&lt;/P&gt;
&lt;P&gt;I have fallowing SVIs are availables below&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;vlan 10 &amp;nbsp; &amp;nbsp; 10.2.0.1&lt;/P&gt;
&lt;P&gt;vlan 20&amp;nbsp;&amp;nbsp; &amp;nbsp; 10.2.30.1&lt;/P&gt;
&lt;P&gt;vlan 30&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.2.40.1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Apr 2018 20:22:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-layer-3-specific-interface/m-p/3359237#M903053</guid>
      <dc:creator>cyberops123</dc:creator>
      <dc:date>2018-04-02T20:22:21Z</dc:date>
    </item>
    <item>
      <title>Re: ssh access to Layer 3 specific interface</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-layer-3-specific-interface/m-p/3359243#M903054</link>
      <description>&lt;P&gt;You can make an extended ACL pointing to the device IP like this:&lt;/P&gt;
&lt;PRE&gt;ip access-list extended NoSSH
 deny tcp host &amp;lt;IP&amp;gt; any eq 22
 permit ip any any&lt;/PRE&gt;
&lt;P&gt;and apply it to each of the SVI, for example:&lt;/P&gt;
&lt;PRE&gt;ip access-list extended NoSSH
 deny tcp host 10.2.0.1 any eq 22
 permit ip any any

interface vlan 10
 ip access-group NoSSH in&lt;/PRE&gt;</description>
      <pubDate>Mon, 02 Apr 2018 20:30:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-layer-3-specific-interface/m-p/3359243#M903054</guid>
      <dc:creator>EduardR</dc:creator>
      <dc:date>2018-04-02T20:30:28Z</dc:date>
    </item>
    <item>
      <title>Re: ssh access to Layer 3 specific interface</title>
      <link>https://community.cisco.com/t5/network-security/ssh-access-to-layer-3-specific-interface/m-p/3359246#M903055</link>
      <description>awesome thats exactly what I was asking . &lt;BR /&gt;&lt;BR /&gt;Thanks again</description>
      <pubDate>Mon, 02 Apr 2018 20:39:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-access-to-layer-3-specific-interface/m-p/3359246#M903055</guid>
      <dc:creator>cyberops123</dc:creator>
      <dc:date>2018-04-02T20:39:56Z</dc:date>
    </item>
  </channel>
</rss>

