10-24-2020 05:33 AM - edited 10-24-2020 12:40 PM
Hi, consider you have these SVI's:
VLAN 10
VLAN 20
VLAN 30
How do you allow devices e.g. in VLAN 20 to connect to a switch with SSH, but disallow devices from other VLANs to establish a SSH connection?
Solved! Go to Solution.
10-24-2020 06:53 AM
Sorry, I think I misunderstood your question.
If you would like to simply restrict user from VLAN20 to sSH to your device. VTY ACL can do that:
access-list standard 10 remark allow VLAN20 traffic permit 20.20.20.0 0.0.0.255 line vty 0 15 access-class 10 in
10-24-2020 06:00 AM
Hi,
Deploy control plane policy to restrict the control plane traffic designed to the device itself.
Using IOS as example:
ip access-list extended ssh-acl remark match incoming ssh traffic to vlan 20 SVI deny tcp any 20.20.20.0 0.0.0.255 eq 22 remark match all other incoming ssh traffic permit tcp any any eq 22 class-map SSH match access name ssh-acl policy-map CoPP class SSH drop class class-default control-plane service-policy input CoPP drop
10-24-2020 06:53 AM
Sorry, I think I misunderstood your question.
If you would like to simply restrict user from VLAN20 to sSH to your device. VTY ACL can do that:
access-list standard 10 remark allow VLAN20 traffic permit 20.20.20.0 0.0.0.255 line vty 0 15 access-class 10 in
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide