According to Cisco FPM can not be applied to a control-plane.

http://www.cisco.com/en/US/docs/ios/12_4t/12_4t4/ht_fpm.html

Restrictions for Flexible Packet Matching

<snip>
*Mapping of FPM policies to control-plane is not supported.

From: [email protected] 
[mailto:[email protected]] On Behalf Of Kingsley Charles
Sent: 02 May 2012 08:47
To: [email protected]
Subject: [OSL | CCIE_Security] FPM to restrict vty access

Hi all

The task asks to allow ssh only from 4.8.6.0/24<http://4.8.6.0/24> and the 
restriction is that we should not use access-lists. So FPM is the only answer.

In the following config, class-map get's matched and 
4.8.6.0/24<http://4.8.6.0/24> is allowed in. The issue is that I need a 
wildcard class-map to block other ssh connections. But that doesn't
work in the following solution.


class-map type access-control match-all telblk
 match field TCP dest-port eq 22

class-map type access-control match-all vlan6
 match field TCP dest-port eq 22
 match field IP source-addr eq 4.8.6.0 mask 0.0.0.255

class-map type stack match-all tcp
 stack-start l2-start
 match field ETHER type eq 0x800 next IP
 match field IP protocol eq 6 next TCP


policy-map type access-control ssh
 class vlan6
 class telblk
   drop

policy-map type access-control tcp
 class tcp
  service-policy ssh

control-plane
 service-policy type access-control input tcp


The following two alternative class-maps also doesn't work

class-map type access-control match-all telblk
match field  ip source-addr  range 0.0.0.0 255.255.255.255

class-map type access-control match-all telblk
match field  ip source-addr 0.0.0.0 mask 255.255.255.255





With regards
Kings
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to