Using an acl to restrict ssh access, Using acls to restrict snmp access – Brocade TurboIron 24X Series Configuration Guide User Manual
Page 100

66
Brocade TurboIron 24X Series Configuration Guide
53-1003053-01
Restricting remote access to management functions
TurboIron(config)#access-list 10 deny host 10.157.22.32 log
TurboIron(config)#access-list 10 deny 10.157.23.0 0.0.0.255 log
TurboIron(config)#access-list 10 deny 10.157.24.0 0.0.0.255 log
TurboIron(config)#access-list 10 deny 10.157.25.0/24 log
TurboIron(config)#access-list 10 permit any
TurboIron(config)#telnet access-group 10
TurboIron(config)#write memory
Syntax: telnet access-group
The
The commands above configure ACL 10, then apply the ACL as the access list for Telnet access.
The device allows Telnet access to all IP addresses except those listed in ACL 10.
To configure a more restrictive ACL, create permit entries and omit the permit any entry at the end
of the ACL.
Example
TurboIron(config)#access-list 10 permit host 10.157.22.32
TurboIron(config)#access-list 10 permit 10.157.23.0 0.0.0.255
TurboIron(config)#access-list 10 permit 10.157.24.0 0.0.0.255
TurboIron(config)#access-list 10 permit 10.157.25.0/24
TurboIron(config)#telnet access-group 10
TurboIron(config)#write memory
The ACL in this example permits Telnet access only to the IP addresses in the permit entries and
denies Telnet access from all other IP addresses.
Using an ACL to restrict SSH access
To configure an ACL that restricts SSH access to the device, enter commands such as the following.
Syntax: ssh access-group
The
These commands configure ACL 12, then apply the ACL as the access list for SSH access. The
device denies SSH access from the IP addresses listed in ACL 12 and permits SSH access from all
other IP addresses. Without the last ACL entry for permitting all packets, this ACL would deny SSH
access from all IP addresses.
NOTE
In this example, the command ssh access-group 10 could have been used to apply the ACL
configured in the example for Telnet access. You can use the same ACL multiple times.
Using ACLs to restrict SNMP access
To restrict SNMP access to the device using ACLs, enter commands such as the following.
TurboIron(config)#access-list 12 deny host 10.157.22.98 log
TurboIron(config)#access-list 12 deny 10.157.23.0 0.0.0.255 log
TurboIron(config)#access-list 12 deny 10.157.24.0/24 log
TurboIron(config)#access-list 12 permit any
TurboIron(config)#ssh access-group 12
TurboIron(config)#write memory