<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic That was it.  I just checked in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/management-plane-protection/m-p/2782168#M915460</link>
    <description>&lt;P&gt;That was it. &amp;nbsp;I just checked the Cisco Feature Navigator, and Management Plane Protection requires the security licence. &amp;nbsp;It is not part of IP Base or Data.&lt;/P&gt;</description>
    <pubDate>Sat, 02 Jan 2016 06:27:02 GMT</pubDate>
    <dc:creator>Philip D'Ath</dc:creator>
    <dc:date>2016-01-02T06:27:02Z</dc:date>
    <item>
      <title>Management Plane Protection</title>
      <link>https://community.cisco.com/t5/network-security/management-plane-protection/m-p/2782162#M915454</link>
      <description>&lt;P&gt;Where has the configuration:&lt;/P&gt;
&lt;DIV class="pEx1_Example1"&gt;
&lt;PRE class="prettyprint"&gt;Router(config)# &lt;B class="cBold"&gt;control-plane host&lt;BR /&gt;Router(config-cp-host)# &lt;B class="cBold"&gt;management-interface FastEthernet 0/0 allow ssh snmp&lt;BR /&gt;&lt;/B&gt;&lt;/B&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;gone in IOS 15.4?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;This used to allow one to secure management plane traffic to specific interfaces so that the Cisco wouldn't listen on all interfaces for SSH etc traffic.&lt;/P&gt;
&lt;P&gt;In IOS 15.4 I can't find an equivalent command and my VRFs are accepting SSH connections which the only way I can stop is with a ACL on each interface of the VRF.&lt;/P&gt;
&lt;P&gt;The process is described here:&amp;nbsp;&lt;A href="http://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html#anc33" target="_blank"&gt;http://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html#anc33&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:40:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/management-plane-protection/m-p/2782162#M915454</guid>
      <dc:creator>Rowan Smith</dc:creator>
      <dc:date>2020-02-21T13:40:33Z</dc:date>
    </item>
    <item>
      <title>What kind of device are you</title>
      <link>https://community.cisco.com/t5/network-security/management-plane-protection/m-p/2782163#M915455</link>
      <description>&lt;P&gt;What kind of device are you doing this on?&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jan 2016 20:59:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/management-plane-protection/m-p/2782163#M915455</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-01-01T20:59:19Z</dc:date>
    </item>
    <item>
      <title>Hi.</title>
      <link>https://community.cisco.com/t5/network-security/management-plane-protection/m-p/2782164#M915456</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;
&lt;P&gt;It's a 2921 running 15.4(3)M4&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Jan 2016 02:57:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/management-plane-protection/m-p/2782164#M915456</guid>
      <dc:creator>Rowan Smith</dc:creator>
      <dc:date>2016-01-02T02:57:28Z</dc:date>
    </item>
    <item>
      <title>I just trued this on a Cisco</title>
      <link>https://community.cisco.com/t5/network-security/management-plane-protection/m-p/2782165#M915457</link>
      <description>&lt;P&gt;I just trued this on a Cisco 2911 running&amp;nbsp;15.4(3)M2. &amp;nbsp;So I doesn't look like it is removed to me.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You're not using TACAS, role based cli, or anything else that might hide the commands from you?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;cisco2911(config)#control-plane host&lt;BR /&gt;cisco2911(config-cp-host)#management-interface ?&lt;BR /&gt; Auto-Template Auto-Template interface&lt;BR /&gt; Dialer Dialer interface&lt;BR /&gt; Embedded-Service-Engine cisco embedded service engine module&lt;BR /&gt; FastEthernet FastEthernet IEEE 802.3&lt;/P&gt;</description>
      <pubDate>Sat, 02 Jan 2016 05:23:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/management-plane-protection/m-p/2782165#M915457</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-01-02T05:23:17Z</dc:date>
    </item>
    <item>
      <title>No, it's just a standard</title>
      <link>https://community.cisco.com/t5/network-security/management-plane-protection/m-p/2782166#M915458</link>
      <description>&lt;P&gt;No, it's just a standard local username/password. &amp;nbsp; Command certainly isn't there for me...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;rtr1#conf t&lt;BR /&gt;Enter configuration commands, one per line. End with CNTL/Z.&lt;BR /&gt;rtr1(config)#con&lt;BR /&gt;rtr1(config)#cont&lt;BR /&gt;rtr1(config)#control-plane host&lt;BR /&gt;rtr1(config-cp-host)#?&lt;BR /&gt;Control Plane host configuration commands:&lt;BR /&gt; exit Exit from control-plane host configuration mode&lt;BR /&gt; no Negate or set default values of a command&lt;BR /&gt; service-policy Configure QOS Service Policy&lt;BR /&gt;&lt;BR /&gt;rtr1(config-cp-host)#management-interface ?&lt;BR /&gt;% Unrecognized command&lt;BR /&gt;rtr1(config-cp-host)#management-interface&lt;BR /&gt; ^&lt;BR /&gt;% Invalid input detected at '^' marker.&lt;BR /&gt;&lt;BR /&gt;rtr1(config-cp-host)#^Z&lt;BR /&gt;rtr1#sh ver&lt;BR /&gt;Cisco IOS Software, C2900 Software (C2900-UNIVERSALK9-M), Version 15.4(3)M4, RELEASE SOFTWARE (fc1)&lt;BR /&gt;Technical Support: &lt;A href="http://www.cisco.com/techsupport" target="_blank"&gt;http://www.cisco.com/techsupport&lt;/A&gt;&lt;BR /&gt;Copyright (c) 1986-2015 by Cisco Systems, Inc.&lt;BR /&gt;Compiled Sun 27-Sep-15 06:34 by prod_rel_team&lt;BR /&gt;&lt;BR /&gt;ROM: System Bootstrap, Version 15.0(1r)M6, RELEASE SOFTWARE (fc1)&lt;BR /&gt;&lt;BR /&gt;rtr1 uptime is 10 hours, 1 minute&lt;BR /&gt;System returned to ROM by reload at 20:28:19 UTC Fri Jan 1 2016&lt;BR /&gt;System image file is "flash:c2900-universalk9-mz.SPA.154-3.M4.bin"&lt;BR /&gt;Last reload type: Normal Reload&lt;BR /&gt;Last reload reason: Reload Command&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;This product contains cryptographic features and is subject to United&lt;BR /&gt;States and local country laws governing import, export, transfer and&lt;BR /&gt;use. Delivery of Cisco cryptographic products does not imply&lt;BR /&gt;third-party authority to import, export, distribute or use encryption.&lt;BR /&gt;Importers, exporters, distributors and users are responsible for&lt;BR /&gt;compliance with U.S. and local country laws. By using this product you&lt;BR /&gt;agree to comply with applicable laws and regulations. If you are unable&lt;BR /&gt;to comply with U.S. and local laws, return this product immediately.&lt;BR /&gt;&lt;BR /&gt;A summary of U.S. laws governing Cisco cryptographic products may be found at:&lt;BR /&gt;&lt;A href="http://www.cisco.com/wwl/export/crypto/tool/stqrg.html" target="_blank"&gt;http://www.cisco.com/wwl/export/crypto/tool/stqrg.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;If you require further assistance please contact us by sending email to&lt;BR /&gt;export@cisco.com.&lt;BR /&gt;&lt;BR /&gt;Cisco CISCO2921/K9 (revision 1.0) with 487424K/36864K bytes of memory.&lt;BR /&gt;Processor board ID XXXXXXXXXX&lt;BR /&gt;3 Gigabit Ethernet interfaces&lt;BR /&gt;1 terminal line&lt;BR /&gt;DRAM configuration is 64 bits wide with parity enabled.&lt;BR /&gt;255K bytes of non-volatile configuration memory.&lt;BR /&gt;254464K bytes of ATA System CompactFlash 0 (Read/Write)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;License Info:&lt;BR /&gt;&lt;BR /&gt;License UDI:&lt;BR /&gt;&lt;BR /&gt;-------------------------------------------------&lt;BR /&gt;Device# PID SN&lt;BR /&gt;-------------------------------------------------&lt;BR /&gt;*1 CISCO2921/K9 XXXXXXXXX&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Technology Package License Information for Module:'c2900'&lt;BR /&gt;&lt;BR /&gt;------------------------------------------------------------------------&lt;BR /&gt;Technology Technology-package Technology-package&lt;BR /&gt; Current Type Next reboot&lt;BR /&gt;------------------------------------------------------------------------&lt;BR /&gt;ipbase ipbasek9 Permanent ipbasek9&lt;BR /&gt;security None None None&lt;BR /&gt;uc None None None&lt;BR /&gt;data datak9 RightToUse datak9&lt;BR /&gt;NtwkEss None None None&lt;BR /&gt;CollabPro None None None&lt;BR /&gt;&lt;BR /&gt;Configuration register is 0x2102&lt;/PRE&gt;</description>
      <pubDate>Sat, 02 Jan 2016 06:05:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/management-plane-protection/m-p/2782166#M915458</guid>
      <dc:creator>Rowan Smith</dc:creator>
      <dc:date>2016-01-02T06:05:28Z</dc:date>
    </item>
    <item>
      <title>I just tried that exact image</title>
      <link>https://community.cisco.com/t5/network-security/management-plane-protection/m-p/2782167#M915459</link>
      <description>&lt;P&gt;I just tried that exact image (15.4(3)m4) on a 2911 and it&amp;nbsp;worked fine.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I&amp;nbsp;notice you have IP Base and Data, while the router I am testing is licenced for more features.&lt;/P&gt;
&lt;P&gt;ipbase ipbasek9 Permanent ipbasek9&lt;BR /&gt;security securityk9 Permanent securityk9&lt;BR /&gt;uc uck9 Permanent uck9&lt;BR /&gt;data datak9 Permanent datak9&lt;BR /&gt;NtwkEss None None None&lt;BR /&gt;CollabPro None None None&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Let me check the CIsco feature navigator.&lt;/P&gt;</description>
      <pubDate>Sat, 02 Jan 2016 06:10:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/management-plane-protection/m-p/2782167#M915459</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-01-02T06:10:07Z</dc:date>
    </item>
    <item>
      <title>That was it.  I just checked</title>
      <link>https://community.cisco.com/t5/network-security/management-plane-protection/m-p/2782168#M915460</link>
      <description>&lt;P&gt;That was it. &amp;nbsp;I just checked the Cisco Feature Navigator, and Management Plane Protection requires the security licence. &amp;nbsp;It is not part of IP Base or Data.&lt;/P&gt;</description>
      <pubDate>Sat, 02 Jan 2016 06:27:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/management-plane-protection/m-p/2782168#M915460</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-01-02T06:27:02Z</dc:date>
    </item>
    <item>
      <title>Thanks for your time. </title>
      <link>https://community.cisco.com/t5/network-security/management-plane-protection/m-p/2782169#M915461</link>
      <description>&lt;P&gt;Thanks for your time.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Jan 2016 06:27:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/management-plane-protection/m-p/2782169#M915461</guid>
      <dc:creator>Rowan Smith</dc:creator>
      <dc:date>2016-01-02T06:27:03Z</dc:date>
    </item>
  </channel>
</rss>

