04-25-2023 08:07 PM
Currently, SNMP and telnet protocols are allowed under our control-management plane. If I enter the "no control-plane" command, will it affect the business of the system?
control-plane
management-plane
inband
interface all
allow Telnet
allow SNMP
!
Solved! Go to Solution.
04-26-2023 09:05 AM
Hi ,
Modifying the control-plane should not affect data plane traffic
this control-plane is used to allow/restrict protocols such as SSH, TELNET, SNMP etc
thank you
04-26-2023 09:05 AM
Hi ,
Modifying the control-plane should not affect data plane traffic
this control-plane is used to allow/restrict protocols such as SSH, TELNET, SNMP etc
thank you
04-26-2023 09:17 AM
@tkarnani It seems I was right, thanks for confirming.
04-26-2023 09:36 AM
But this make your Device is some risk' instead adjust control instead of disable it.
04-26-2023 08:04 PM
Thank you for your suggestion, but is there no relevant configuration for the control-plane on the default device?
05-14-2023 05:38 AM
How about adding specific sources of your ssh jump stations to the config and keep your device safe. You just need to add an ACL to your control plane config.
control-plane
management-plane
inband
interface all
allow SSH peer
address ipv4 x.x.x.x
In if you are in doubt you would loose remote access to the device, just "commit confirm" with a timer, so you get a life line.
05-16-2023 08:26 AM
HI Sam
Thanks for your suggestion.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide