10-17-2009 12:39 PM - edited 03-06-2019 08:10 AM
hi,
I have one L3 switch with two vlan interfaces 10.1.1.1 and 20.1.1.1. On the same switches two hosts are there in each vlan. Now I want that only 10.1.1.11 can telnet the switch from the vlan interface IP's (10.1.1.1 and 20.1.1.1)
I wrote access list
access-list 101 permit tcp host 10.1.1.11 host 10.1.1.1 eq 23
access-list 101 permit tcp host 10.1.1.11 host 20.1.1.1 eq 23
and applied it as
line vty 0 4
access-class 101 in
but none of the host is able to connect to switch but if I apply that as access-class 101 out then both systems get access.
None of the direction is achieving the goal and I want to use exteneded list only becaue when I use std list as access-list 1 permit 10.1.1.1 and apply to line as access-class 1 in goal is achived..
Please suggest abt the extended list behavioue to perform this task
thanks !!!
Solved! Go to Solution.
08-18-2015 09:16 AM
Is this still the case these days with new IOS/IOS XE? This is a huge issue when your talking about a multi-layer switch with multiple SVIs and VRFs and needing only the management SVI/VRF to respond to any connection request coming from a source.
08-18-2015 09:37 AM
As far as access class is concerned I believe that the situation today is just as it was 6 years ago when this discussion took place. But we now have some tools available that were not available 6 years ago. I believe that you should be able to use something like Control Plane Protection or Control Plane Policing to control management access.
HTH
Rick
08-18-2015 09:44 AM
Many why cant this stuff be a bit more simple without having to learn a whole new subject of cisco....smh
02-22-2018 06:01 AM
Job security?
02-22-2018 03:12 PM
You have picked a very old thread to bring back to life (original discussion in 2009 with additional question in 2015). But having brought it back to life let us consider other answers that are possible.
First let us remember that when access-class was introduced and when the original question was asked that our networks were much simpler and our devices had fewer interfaces. There was a concern about how to control access to our network devices, and especially how to control where the request came from. There was not much reason to be concerned about which interface had received the request. access-class was developed to address this requirement. I would assert that it was a very effective solution to that requirement.
Now think about the environment quite a few years later. Our networks are more complex. Our devices have more interfaces. The sophistication of attacks has increased. Now from a security perspective we are concerned not only about where the request came from but are concerned about how the request got to us. (remember that the question in 2015 was how to differentiate a request received on the management interface from a request received on a data interface) This is quite a change in terms of scope and complexity. While it might have been able to meet this requirement by making changes in access-class that would have been difficult and would have presented significant challenges in backward compatibility to older versions of code implementation of access-class. It was easier and cleaner to solve this new requirement by developing a new feature. And that is what Cisco chose to do.
access-class is still available when our requirement is just to control where the access request came from. And the new control place control processes are available when we need to address other requirements such as which interface received the request.
HTH
Rick
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide