[Contents] [Prev] [Next] [Index] [Report an Error]

Filtering Authorized Managers by Source Address

This example firewall filter limits manager access to ssh access from a device with source address 192.168.14.33. It is applied to the loopback (lo0 ) interface as an input filter, and logs and rejects (silently discards) any attempts to access the router that do not meet these conditions.

Note: This firewall filter is only an example; do not copy the addressing specifics and use them on an actual system.

Configure the policy options and firewall filter:

[edit policy-options]
prefix-list ssh-addresses {
192.168.14.33;
}
}
[edit firewall family inet]
filter CC_MGR_Access {
term ssh–okay {
from {
source-prefix–list {
ssh-addresses;
}
protocol tcp;
port ssh;
}
then accept;
}
term other–okay {
from {
destination-port-except ssh;
then {
accept;
}
term no–ssh {
then {
log;
reject;
}
}
}

Apply as an input filter to lo0:

[edit interfaces lo0 unit 0 family inet]
filter {
input CC_MGR_Access;
}

[Contents] [Prev] [Next] [Index] [Report an Error]