Secure Shell 2
ExtremeWare XOS 11.3 Concepts Guide
337
For additional information on the SSH protocol refer to Federal Information Processing Standards
Publication (FIPSPUB) 186, Digital Signature Standard, 18 May 1994. This can be download from: ftp://
ftp.cs.hut.fi/pub/ssh. General technical information is also available from:
http://www.ssh.fi
Using ACLs to Control SSH2 Access
You can restrict SSH2 access by creating and implementing an ACL policy. You configure an ACL policy
to permit or deny a specific list of IP addresses and subnet masks for the SSH2 port.
There are two methods to load ACL policies to the switch:
●
Use the
edit policy
command to launch a VI-like editor on the switch. You can create the policy
directly on the switch.
●
Use the
tftp
command to transfer a policy that you created using a text editor on another system to
the switch.
For more information about creating and implementing ACLs and policies, see
Chapter 12
, “
Policy
Manager
” and
Chapter 13
, “
Access Lists (ACLs)
.”
Sample SSH2 Policies
The following are sample policies that you can apply to restrict SSH2 access.
In the following example named MyAccessProfile.pol, the switch permits connections from the subnet
10.203.133.0/24 and denies connections from all other addresses:
MyAccessProfile.pol
Entry AllowTheseSubnets {
if {
source-address 10.203.133.0 /24;
}
then
{
permit;
}
}
In the following example named MyAccessProfile_2.pol, the switch does not permit connections from
the subnet 10.203.133.0/24 but accepts connections from all other addresses:
MyAccessProfile_2.pol
Entry dontAllowTheseSubnets {
if {
source-address 10.203.133.0 /24;
}
then
{
deny;
}
}
Entry AllowTheRest {
Содержание ExtremeWare XOS 11.3
Страница 20: ...Contents ExtremeWare XOS 11 3 Concepts Guide 20...
Страница 25: ...1 Using ExtremeWare XOS...
Страница 26: ......
Страница 38: ...ExtremeWare XOS Overview ExtremeWare XOS 11 3 Concepts Guide 38...
Страница 58: ...Accessing the Switch ExtremeWare XOS 11 3 Concepts Guide 58...
Страница 146: ...Configuring Slots and Ports on a Switch ExtremeWare XOS 11 3 Concepts Guide 146...
Страница 218: ...Status Monitoring and Statistics ExtremeWare XOS 11 3 Concepts Guide 218...
Страница 240: ...Virtual LANs ExtremeWare XOS 11 3 Concepts Guide 240...
Страница 248: ...Virtual Routers ExtremeWare XOS 11 3 Concepts Guide 248...
Страница 278: ...Access Lists ACLs ExtremeWare XOS 11 3 Concepts Guide 278...
Страница 288: ...Routing Policies ExtremeWare XOS 11 3 Concepts Guide 288 entry deny_rest if then deny...
Страница 344: ...Security ExtremeWare XOS 11 3 Concepts Guide 344...
Страница 393: ...2 Using Switching and Routing Protocols...
Страница 394: ......
Страница 454: ...Spanning Tree Protocol ExtremeWare XOS 11 3 Concepts Guide 454...
Страница 484: ...Extreme Standby Router Protocol ExtremeWare XOS 11 3 Concepts Guide 484...
Страница 514: ...IPv4 Unicast Routing ExtremeWare XOS 11 3 Concepts Guide 514...
Страница 530: ...IPv6 Unicast Routing ExtremeWare XOS 11 3 Concepts Guide 530...
Страница 538: ...RIP ExtremeWare XOS 11 3 Concepts Guide 538...
Страница 556: ...OSPF ExtremeWare XOS 11 3 Concepts Guide 556...
Страница 566: ...OSPFv3 ExtremeWare XOS 11 3 Concepts Guide 566...
Страница 589: ...3 Appendixes...
Страница 590: ......
Страница 640: ...CNA Agent ExtremeWare XOS 11 3 Concepts Guide 640...
Страница 670: ...Glossary ExtremeWare XOS 11 3 Concepts Guide 670...
Страница 698: ...Index ExtremeWare XOS 11 3 Concepts Guide 698...