4.8 Ensure access SSH to CLI interface is restricted to needed IP addresses only

Information

To limit ssh access to trusted IPs only

Rationale:

Impact:

Restricting access to the system MGT interface is to ensure that even if an attacker gains access to privileged credentials, his/her ability to get in and do damage is still limited.

Solution

1-Log in to the Configuration utility.

2-Go to System > Platform.

3-For SSH IP Allow, select Specify Range and then enter the IP addresses or address ranges for the remote systems allowed to use SSH to communicate with this system.

See Also

https://workbench.cisecurity.org/files/3587