cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
44651
Views
38
Helpful
19
Replies

access list on line vty

sharma16031981
Level 1
Level 1

hi,

I have one L3 switch with two vlan interfaces 10.1.1.1 and 20.1.1.1. On the same switches two hosts are there in each vlan. Now I want that only 10.1.1.11 can telnet the switch from the vlan interface IP's (10.1.1.1 and 20.1.1.1)

I wrote access list

access-list 101 permit tcp host 10.1.1.11 host 10.1.1.1 eq 23

access-list 101 permit tcp host 10.1.1.11 host 20.1.1.1 eq 23

and applied it as

line vty 0 4

access-class 101 in

but none of the host is able to connect to switch but if I apply that as access-class 101 out then both systems get access.

None of the direction is achieving the goal and I want to use exteneded list only becaue when I use std list as access-list 1 permit 10.1.1.1 and apply to line as access-class 1 in goal is achived..

Please suggest abt the extended list behavioue to perform this task

thanks !!!

19 Replies 19

Is this still the case these days with new IOS/IOS XE? This is a huge issue when your talking about a multi-layer switch with multiple SVIs and VRFs and needing only the management SVI/VRF to respond to any connection request coming from a source.

 

As far as access class is concerned I believe that the situation today is just as it was 6 years ago when this discussion took place. But we now have some tools available that were not available 6 years ago. I believe that you should be able to use something like Control Plane Protection or Control Plane Policing to control management access.

 

HTH

 

Rick 

HTH

Rick

Many why cant this stuff be a bit more simple without having to learn a whole new subject of cisco....smh

Job security?

You have picked a very old thread to bring back to life (original discussion in 2009 with additional question in 2015). But having brought it back to life let us consider other answers that are possible.

 

First let us remember that when access-class was introduced and when the original question was asked that our networks were much simpler and our devices had fewer interfaces. There was a concern about how to control access to our network devices, and especially how to control where the request came from. There was not much reason to be concerned about which interface had received the request. access-class was developed to address this requirement. I would assert that it was a very effective solution to that requirement.

 

Now think about the environment quite a few years later. Our networks are more complex. Our devices have more interfaces. The sophistication of attacks has increased. Now from a security perspective we are concerned not only about where the request came from but are concerned about how the request got to us. (remember that the question in 2015 was how to differentiate a request received on the management interface from a request received on a data interface)  This is quite a change in terms of scope and complexity. While it might have been able to meet this requirement by making changes in access-class that would have been difficult and would have presented significant challenges in backward compatibility to older versions of code implementation of access-class. It was easier and cleaner to solve this new requirement by developing a new feature. And that is what Cisco chose to do.

 

access-class is still available when our requirement is just to control where the access request came from. And the new control place control processes are available when we need to address other requirements such as which interface received the request.

 

HTH

 

Rick

HTH

Rick