cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1404
Views
5
Helpful
6
Replies

restrict VTY access on switch

mdieken011
Level 1
Level 1

I have a switch outside our firewall open to the Internet.  It is a newer 3650 switch.  I have an ACL assigned to the vty interface that should restrict management traffic to it.  I found it went into quiet mode because someone was doing a dictionary attack against it.  They attackers were using http authentication built into the switch for management to launch the attack.  I had to turn off http and https server to block them.  My question is why was the ACL not blocking this dictionary attack?

1 Accepted Solution

Accepted Solutions

Believe SSH is also considered to use a VTY line.

SSH and telnet are also controlled by transport line under VTY. Not so for HTTP or HTTPS.

View solution in original post

6 Replies 6

Joseph W. Doherty
Hall of Fame
Hall of Fame
If you're asking why a VTY ACL didn't block HTTP or HTTPS, it's likely because the latter isn't using a VTY line.

I don't quite follow Joseph.  It was blocking ssh traffic but not port 80 and 443 access.

Believe SSH is also considered to use a VTY line.

SSH and telnet are also controlled by transport line under VTY. Not so for HTTP or HTTPS.

BTW, some other vendors work differently. One that comes to mine, you apply an ACL to the loopback interface, and it controls what goes to the device's management.

its good practice to turn off http/https on switches its unsecure , dont use it on any of our switches globally for that reason

no ip http server
no ip http secure-server

also good practice to use login feature matched to the acl on your vty list for a bit of extra protection

login block-for 300 attempts 10 within 60
login quiet-mode access-class xx
login on-failure log
login on-success log

You can also use MPP feature for mgmt traffic to prevent certain interfaces using it
https://www.cisco.com/c/en/us/td/docs/ios/12_4t/12_4t11/htsecmpp.html
Review Cisco Networking for a $25 gift card