- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-06-2011 06:22 AM - edited 03-04-2019 12:17 PM
Hello All,
I have tried to restrict access to loopback interface using ACL's with no luck. Does anyone know how this can be done?
Thanks,
Ram
Solved! Go to Solution.
- Labels:
-
Routing Protocols
Accepted Solutions

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-06-2011 06:27 AM
The loopback is a "special" interface.
To limit connectvity you should look into restricting via the Control Plane - BEWARE you break everything if configured incorrectly. Read the below VERY carefully.
http://www.cisco.com/en/US/docs/ios/sec_control_plane/configuration/guide/12_4t/cps_12_4t_book.html
HTH>

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-06-2011 06:27 AM
The loopback is a "special" interface.
To limit connectvity you should look into restricting via the Control Plane - BEWARE you break everything if configured incorrectly. Read the below VERY carefully.
http://www.cisco.com/en/US/docs/ios/sec_control_plane/configuration/guide/12_4t/cps_12_4t_book.html
HTH>

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-06-2011 06:52 AM
Andrew is correct.
Think "why" you're doing before doing it.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-06-2011 09:07 AM
Thanks Andrew. I will try it
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-12-2011 05:21 AM
I used management plane protection and it works great!
control-plane host
management-interface FastEthernet4 allow ssh snmp
