Restricting remote access to a controller or service platform ensures only trusted hosts can communicate with enabled management services. This ensures only trusted hosts can perform management tasks and provide protection from brute force attacks from hosts attempting to break into the controller or service platform managed network.
Administrators can permit management connections to be established on any IP interface on the controller or service platform (including IP interfaces used to provide captive portal guest access).
Administrators can restrict management access by limiting access to a specific host (IP address), subnet, or ACL on the controller or service platform.
Interface | Description | IP Address | Management |
---|---|---|---|
VLAN10 | Services | Yes | Yes |
VLAN70 | Guest | Yes | No |
By default, management services are accessible on both VLAN10 and VLAN70. By restricting access to VLAN10, the controller only accepts management sessions on VLAN10. Management access on VLAN70 is longer available.
Administrators can secure access to a controller or service platform by disabling less secure interfaces. By default, the CLI, SNMP and FTP disable interfaces that do not support encryption or authentication. However, Web management using HTTP is enabled. Insecure management interfaces such as Telnet, HTTP and SNMP should be disabled, and only secure management interfaces, like SSH and HTTPS should be used to access the controller or service platform managed network.
Access type | Encryption | Authentication | Default state |
---|---|---|---|
Telnet | No | Yes | Deactivated |
SNMPv2 | No | No | Activated |
SNMPv3 | Yes | Yes | Activated |
HTTP | No | Yes | Deactivated |
HTTPS | Yes | Yes | Deactivated |
FTP | No | Yes | Deactivated |
SSHv2 | Yes | Yes | Deactivated |
To set an access control configuration for the Management Access policy: