cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
873
Views
10
Helpful
3
Replies

interface restrictions

suthomas1
Level 6
Level 6

Good day all,

 

In a layer 3 switch with multiple svi, how can we disable ssh access for all the svi interfaces.

If a switch has 3 vlans - vlan 10, vlan 11, vlan 12 ; these svi should not permit any ssh or telnet service to it.

These vlan interface do not have any acl on them.

those services should be only through management designated interfaces.

 

 

 

 

1 Accepted Solution

Accepted Solutions

Hello @suthomas1 ,

I am afraid the source-interface command is effective only for outbound SSH sessions when the device is used to connect in SSH to another device.

To force incoming SSH sessions to be accepted only on one specific interface I think you should use an IP extended ACL applied to the line vty

 

something like

access-list 111 permit tcp any host 192.168.1.1 eq 22

 

line vty 0 4

access-class 111 in

 

But I advise you that using extended ACLs on line vty it is tricky and can lead to undesired results.

 

Hope to help

Giuseppe

 

View solution in original post

3 Replies 3

balaji.bandi
Hall of Fame
Hall of Fame

how about configuring source interface.

 

ip ssh source-interface interface

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/d1/sec-d1-cr-book/sec-cr-i3.html#wp5893687220

 

You can also have simple ACL to coming in to VTY Lines - example 

 

ip access-list standard ALLOW-SSH
permit 192.168.100.0 0.0.0.255

line vty 0 15
transport ssh
access-class ALLOW-SSH in

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

we want to avoid using access list. if all vlans can be permitted not be used for ssh access with the use of that source-interface command, then that is the preferred choice.

 

appreciate the help.

Hello @suthomas1 ,

I am afraid the source-interface command is effective only for outbound SSH sessions when the device is used to connect in SSH to another device.

To force incoming SSH sessions to be accepted only on one specific interface I think you should use an IP extended ACL applied to the line vty

 

something like

access-list 111 permit tcp any host 192.168.1.1 eq 22

 

line vty 0 4

access-class 111 in

 

But I advise you that using extended ACLs on line vty it is tricky and can lead to undesired results.

 

Hope to help

Giuseppe