I am interested and only allow SSH traffic from entering from a lan interface and not my outside public facing interface. I am noticiing random user accounts with the show users account. I see the ip address that it comes from. they only show being in for 2 and 3 seconds. I use the clear line vty command to kill the session but they come right back within seconds. When I look at the config there are two username/password commands that I've created. How is this occuring?
We do not have enough information to understand or to explain to you how this is happening. If you want to give us enough information to work with then we can try to provide explanation to you.
In the meantime I will give you 2 suggestions about things you can do to help control this (assuming that you have not already done them):
1) you can configure an access list (usually a standard access list is better for this than an extended access list) to control what addresses can establish remote access to the router. You assign the access list to the vty lines using the command access-class in
2) you can use an access list applied inbound on the public facing interface to deny tcp any any eq 22.
As mention, I'd create an ACL to limit what addresses can access the VTY lines. Include CoPP just because to not exclude important protocols from the policy.
I would also tweak your SSH config make sure you utilize version 2 specify a source interface. Configure the login block feature as well and definitely specify a quiet mode ACL so you lose management of your own device.
All that should get you in a good position.
Maybe place a deny any any log entry at the of the your ACLs if you still notice the connections attempts.
Hi everyone, I would like to thank you in advance for any help you can provide a newcomer like myself!
Im studying the 100-105 book by Odom and am currently on the topic of Port security. I purchased a used 2960 and I'm trying to follow a...
While deploying a number of 18xx/2802/3802 model access points (APs), which run AP-COS as their operating platform. It can be observed on some occasions that while many of their access points were able to join the fabric WLC withou...
I am going to design and build an LAN network under a tunnel underground with long distance between the switches.
I will have 2 Catalyst switches and 8 Industrial IE3000, and they will be connected with fiber.
For now I am planning on use Layer-2 s...