Sorry for the naive question; a quick reading of the cisco docs doesn't answer this question...
So I've got a router (say for the sake of argument a 4500 running IOS 15.x)
It has interfaces in 3 different subnets -- 10.0.0.1/24, 10.0.1.1/24, and 10.0.2.1/24 It also has a loopback address of 172.16.0.33
How do I make it so that SSH / SNMP and other administrative traffic works on the 172 address but doesn't work on the IP addresses I wish to only use for L3 forwarding?
Ideally this can be done by disabling the control plane access to these interfaces not just by using an ACL, but whatever, I don't actually care that much as long as it works...
Thanks!
You can't disable the daemon on a interface. ACL are the way to go. Filtering should be done on the source address, not destination.
Config example:
In this config,
172.16.10.0/24
is your management network where you have your NMS, and you have no ipv6 on the NMS but there is some on the switch, so it has to protected.Be sure also to disable sshv1 which is enabled by default :
Control Plane Policing would be the cleanest implementation
First, create an ACL that MATCHES traffic which you will ultimately drop
Next, create a class-map that matches the ACL you created above:
Next, create a policy-map with action DROP on the desired traffic
Finally, apply the Control plane policing to your control plane
Any traffic destined for the control plane which does NOT match your access list will PASS (this includes SNMP and SSH traffic destined for the Loopback address)