Using ACLs to Control SSH2 Access

You can restrict SSH2 access by creating and implementing an ACL (Access Control List) policy.

You configure an ACL policy to permit or deny a specific list of IP addresses and subnet masks for the SSH2 port.

The two methods to load ACL policies to the switch are:
  • Use the edit policy command to launch a VI-like editor on the switch. You can create the policy directly on the switch.

  • Use the tftp command to transfer a policy that you created using a text editor on another system to the switch.

For more information about creating and implementing ACLs and policies, see Security and ACLs.