05-14-2020 04:10 AM
Hi all,
We want to use RESTCONF in our network (Cat9k / IOS-XE 16.12). However, I want to restrict access by using an ACL.
So, there are two options:
Both options are not really an option, because the switch still answers to not allowed IPs with HTTP 403 (ip http access-class) or HTTP 401 (restconf ipv4 access-list). This is not really what I understand under hardending. For the SNMP or VTY ACL functionality, the packet is dropped, before it reaches the corresponding daemon.
Open socket means, that the whole HTTP server (nginx) is still attackable.
CoPP is not an option, because user classes are not supported on IOS-XE for Catalyst 9k
MPP is not an option, because it's not implemented on IOS-XE for Catalyst 9k.
How to handle this?
05-14-2020 04:36 AM - edited 05-14-2020 04:37 AM
Genereally I have used in the Lab enviroment to test - we use these as seperate network for the manging the config, like OOB IP range, so normal user can not have access to that VLAN as part of Security mechanism. you can completely block with VLAN ACL or do not advertise them in the other routing table.
hope you might have looked below config : ( as per your syntax you already looked)
05-14-2020 05:31 AM
Hey BB,
unfortunately the OOB / OBM access doesn't solve this one.
The HTTP server on the switch listens on all IP interfaces. If you have a L3 switch (e.g. core/distribution) layer, you need to somehow limit all IPs...
Infrastructure ACLs (pACL, vACL) are not really an option here. These ACLs also block data plane traffic. You need to be careful how to design those rules.
Thanks for the suggestions though.
11-19-2020 03:28 PM
I agree that this is a very frustrating limitation. I would have thought it should be fairly basic functionality for it to be possible to specify one or more interfaces on which the various management services listen for incoming connections. In fact I am shocked that has not been implemented.
As it stands, there is no way to enable HTTP(S)-based services in IOS-XE that is sufficiently secure for my needs. To add to the problems with the current options highlighted by Johannes:
03-08-2023 05:34 AM
Just found this discussion - did any of you ever find a satisfactory solution as just looking at the same thing now?
03-08-2023 07:06 AM
Not really... for RESTCONF I decided to use the HTTP ACL, because of one simple reason. I wanted to reuse an existing ACL, which has minush/dash in the name. Because of bug CSCvy24754, this was not supported (at least not in the former release I was using).
Also I tuned the HTTP services, that no WebUI access is possible etc.
Long story short: No! However I have the feeling nobody cares about it and I'm the only paranoic person around
03-08-2023 02:48 PM
Ha ha thanks for the update @Johannes Luther
10-20-2023 12:25 PM
Unfortunatley a lot of people care about it now all of a sudden...
"Long story short: No! However I have the feeling nobody cares about it and I'm the only paranoic person around"
10-21-2023 05:43 AM - edited 10-21-2023 05:44 AM
Indeed @jcohoe but the problem we're finding is that most Cisco staff do not seem to understand how 9800 series WLC uses the web server for wireless client web-auth so turning off web services is not an option if you use web-auth, and using ACLs is not a solution to the problem because those clients need to be able to access the web server for captive portal redirects or local web auth!
So will Cisco now be taking IOS-XE web services security a bit more seriously? CSDL?
02-17-2025 12:37 PM
Is there any movement on this? Allowing access on only the management vrf would be sufficient.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide