<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAR to allow Reverse Telnet only in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/nar-to-allow-reverse-telnet-only/m-p/655702#M421494</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;your a star .. i had assumed as the NAR was IP based that the port reflected the IP port not the router assigned tty ..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;putting tty65 in the NAR has resolved my problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Feb 2007 11:43:28 GMT</pubDate>
    <dc:creator>pregan</dc:creator>
    <dc:date>2007-02-27T11:43:28Z</dc:date>
    <item>
      <title>NAR to allow Reverse Telnet only</title>
      <link>https://community.cisco.com/t5/network-access-control/nar-to-allow-reverse-telnet-only/m-p/655700#M421492</link>
      <description>&lt;P&gt;Hi .. i'm trying to restrict access to a modem attached to the aux port (2065)of a 2600.. i've created an IP based permit NAR with the AAA Client, port:2065, * .. which if i read correctly should give rev telnet access to just #.#.#.# 2065.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when i apply the nar the failed log shows 'User Access Filtered'.  if i take the nar off it works fine so i'm pretty sure its a group problem rather than device config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does the port apply to the src rather than dst port ?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:00:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nar-to-allow-reverse-telnet-only/m-p/655700#M421492</guid>
      <dc:creator>pregan</dc:creator>
      <dc:date>2019-03-10T22:00:35Z</dc:date>
    </item>
    <item>
      <title>Re: NAR to allow Reverse Telnet only</title>
      <link>https://community.cisco.com/t5/network-access-control/nar-to-allow-reverse-telnet-only/m-p/655701#M421493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Theres good info here (&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_white_paper09186a00801a8fd0.shtml#wp39282" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_white_paper09186a00801a8fd0.shtml#wp39282&lt;/A&gt;) about where the data port field comes from.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically from the port field in the TACACS+ header is matched against the NAR port entry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did a quick test using tactest with an IP based NAR allowing access to a test device on port tty1 from 1.1.1.1 and it worked:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TACACS&amp;gt; authen login ascii login tty1 1.1.1.1&lt;/P&gt;&lt;P&gt;User Access Verification&lt;/P&gt;&lt;P&gt;Username: daz&lt;/P&gt;&lt;P&gt;Password: 123456&lt;/P&gt;&lt;P&gt;Authentication succeeded :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TACACS&amp;gt; authen login ascii login tty2 1.1.1.1&lt;/P&gt;&lt;P&gt;User Access Verification&lt;/P&gt;&lt;P&gt;Username: daz&lt;/P&gt;&lt;P&gt;Password: 123456&lt;/P&gt;&lt;P&gt;Authentication failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Look in your Failed Attempts report. Whatever value is in the "NAS-Port" column is one used by the NAR. I guess its possible for reverse telnet IOS might send the destination port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darran&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Feb 2007 11:09:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nar-to-allow-reverse-telnet-only/m-p/655701#M421493</guid>
      <dc:creator>darpotter</dc:creator>
      <dc:date>2007-02-27T11:09:08Z</dc:date>
    </item>
    <item>
      <title>Re: NAR to allow Reverse Telnet only</title>
      <link>https://community.cisco.com/t5/network-access-control/nar-to-allow-reverse-telnet-only/m-p/655702#M421494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;your a star .. i had assumed as the NAR was IP based that the port reflected the IP port not the router assigned tty ..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;putting tty65 in the NAR has resolved my problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Feb 2007 11:43:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nar-to-allow-reverse-telnet-only/m-p/655702#M421494</guid>
      <dc:creator>pregan</dc:creator>
      <dc:date>2007-02-27T11:43:28Z</dc:date>
    </item>
  </channel>
</rss>

