<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I know this question was in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/1415548#M944317</link>
    <description>&lt;P&gt;I know this question was asked quite awhile ago but I'm sure people are still trying to find an answer to this question. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm currently studying for my CCNA exam and in one of the labs it asks to apply an ACL to the VTY lines that would allow access to only one of the &lt;STRONG&gt;local&lt;/STRONG&gt; IP Addresses configured on a router(say loopback 0). this cannot be done (at least in any of the GNS 3 devices I have setup). To &lt;STRONG&gt;only&lt;/STRONG&gt; allow Telnet/SSH access to one of the configured addresses, you must apply the ACL to an interface, not the VTY lines.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I hope this helps anyone else out there that is currently looking for a solution to this problem.&lt;/P&gt;</description>
    <pubDate>Sun, 29 May 2016 20:00:27 GMT</pubDate>
    <dc:creator>justnetsolutions</dc:creator>
    <dc:date>2016-05-29T20:00:27Z</dc:date>
    <item>
      <title>Access list isses on VTY lines</title>
      <link>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/1415542#M944311</link>
      <description>&lt;P&gt;Hi I was hopeing some one could explain how to do this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to restrict my core switchs (4506's) to only accept incomming SSH and Telent (managment) traffic that is directed to a single ip interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought I could do this by placing a access list on the VTY lines that says&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#access list 101 permit tcp any host 192.168.1.254 eq 22 log&lt;/P&gt;&lt;P&gt;#access list 101 permit tcp and host 192.168.1.254 eq 23 log&lt;/P&gt;&lt;P&gt;#access list 101 deny ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and simple assign that list inbound to the VTY interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;however this then blocks all access to the VTY line? the log is as shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jan&amp;nbsp; 8 11:41:54.247: %SEC-6-IPACCESSLOGP: list 101 denied tcp 192.168.5.25(4258) -&amp;gt; 0.0.0.0(22), 1 packet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So i can see what is happening becasue the 4506 is the default gate way for the 192.168.5.0 network, it is seeing the packet as directed to self and no to the 192.168.1.254 address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is, is there any way around this. I was hoping to be able to restrict managment access to the 192.168.66.254 address,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont want to stop other sub nets being able to manage this swith, but they would all ahve to mange it through a single IP address. this switch may end up with many subnet interfaces and I would rather be able to say allow this interface and deny all others by default, than have to manualy deny all other interfaces one by one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas how I can get this to work ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:50:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/1415542#M944311</guid>
      <dc:creator>VLA_WeyBridge_2</dc:creator>
      <dc:date>2020-02-21T11:50:43Z</dc:date>
    </item>
    <item>
      <title>Re: Access list isses on VTY lines</title>
      <link>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/1415543#M944312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To restrict the access of the switch&amp;nbsp; via vty just do the below configuration in switches so that only permitted ip' can access the switch via telnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list standard admin&lt;BR /&gt; permit 10.9.4.4&lt;BR /&gt; permit 10.198.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Cisco_1811#conf t&lt;BR /&gt;Enter configuration commands, one per line.&amp;nbsp; End with CNTL/Z.&lt;BR /&gt;Cisco_1811(config)#line vty 0 15&lt;BR /&gt;Cisco_1(config-line)#access-class admin in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps out your query !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ganesh.H&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jan 2010 10:23:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/1415543#M944312</guid>
      <dc:creator>Ganesh Hariharan</dc:creator>
      <dc:date>2010-01-11T10:23:22Z</dc:date>
    </item>
    <item>
      <title>Re: Access list isses on VTY lines</title>
      <link>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/1415544#M944313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;See this still allows Access via any interface IP address the switch/router is configured with.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to restricit managment ment to a single interface on the routers/switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment uses are assigned an access list as they log on to the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;which says something like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;deny ip any 192.168.1.0 0.0.0.255&lt;/P&gt;&lt;P&gt;deny tcp any 192.168.2.0 0.0.0.255 RDP&lt;/P&gt;&lt;P&gt;permit any any.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So they are denied acess to different parts of the network depending what group they are in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The idea being that no matter what PC they log on to in what ever subnet they will always be denided access based on the user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the problem with your solution is that then the managemnt uinterface can only be access from one PC or subnet, as it is based on the source address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to limit it based on the distination address,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IE, not who it is comming from, but to what IP address it is directed to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then if I say that a user can / can't reach the 192.168.1.0 (managment subnet) then I can centraly managem access to the switch managent.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jan 2010 11:42:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/1415544#M944313</guid>
      <dc:creator>VLA_WeyBridge_2</dc:creator>
      <dc:date>2010-01-11T11:42:32Z</dc:date>
    </item>
    <item>
      <title>Re: Access list isses on VTY lines</title>
      <link>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/1415545#M944314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Clear your question in breif manner you want create management restriction or want to block different network from one lan to other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ganesh.H&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jan 2010 11:49:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/1415545#M944314</guid>
      <dc:creator>Ganesh Hariharan</dc:creator>
      <dc:date>2010-01-11T11:49:04Z</dc:date>
    </item>
    <item>
      <title>Re: Access list isses on VTY lines</title>
      <link>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/1415546#M944315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I want to do exactly what you have said&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;assing an access list on to the VTY line,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but i want to filter based on the destination address (not the source address.)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jan 2010 11:54:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/1415546#M944315</guid>
      <dc:creator>VLA_WeyBridge_2</dc:creator>
      <dc:date>2010-01-11T11:54:46Z</dc:date>
    </item>
    <item>
      <title>Re: Access list isses on VTY lines</title>
      <link>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/1415547#M944316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To restrict incoming and outgoing connections between a particular vty (into a Cisco device) and the addresses in an access list, use the access-class command in line configuration mode. To remove access restrictions, use the no form of this command.&lt;BR /&gt;access-class access-list-number {in [vrf-also] | out}&lt;BR /&gt;no access-class access-list-number {in | out}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Syntax Description&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list-number&lt;BR /&gt;Number of an IP access list. This is a decimal number from 1 to 199 or from 1300 to 2699.&lt;BR /&gt;in&lt;/P&gt;&lt;P&gt;Restricts incoming connections between a particular Cisco device and the addresses in the access list.&lt;BR /&gt;vrf-also&lt;/P&gt;&lt;P&gt;Accepts incoming connections from interfaces that belong to a VRF.&lt;BR /&gt;out&lt;BR /&gt;Restricts outgoing connections between a particular Cisco device and the addresses in the access list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Usage Guidelines&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Remember to set identical restrictions on all the virtual terminal lines because a user can connect to any of them.&lt;BR /&gt;To display the access lists for a particular terminal line, use the show line EXEC command and specify the line number.&lt;BR /&gt;If you do not specify the vrf-also keyword, incoming Telnet connections from interfaces that are part of a VRF are rejected.&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Examples&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The following example defines an access list that permits only hosts on network 192.89.55.0 to connect to the virtual terminal ports on the router:&lt;BR /&gt;access-list 12 permit 192.89.55.0&amp;nbsp; 0.0.0.255&lt;BR /&gt;line 1 5&lt;BR /&gt;access-class 12 in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following example defines an access list that denies connections to networks other than network 36.0.0.0 on terminal lines 1 through 5:&lt;BR /&gt;access-list 10 permit 36.0.0.0 0.255.255.255&lt;BR /&gt;line 1 5&lt;BR /&gt;access-class 10 out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps out your query !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ganesh.H&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jan 2010 11:23:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/1415547#M944316</guid>
      <dc:creator>Ganesh Hariharan</dc:creator>
      <dc:date>2010-01-12T11:23:35Z</dc:date>
    </item>
    <item>
      <title>I know this question was</title>
      <link>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/1415548#M944317</link>
      <description>&lt;P&gt;I know this question was asked quite awhile ago but I'm sure people are still trying to find an answer to this question. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm currently studying for my CCNA exam and in one of the labs it asks to apply an ACL to the VTY lines that would allow access to only one of the &lt;STRONG&gt;local&lt;/STRONG&gt; IP Addresses configured on a router(say loopback 0). this cannot be done (at least in any of the GNS 3 devices I have setup). To &lt;STRONG&gt;only&lt;/STRONG&gt; allow Telnet/SSH access to one of the configured addresses, you must apply the ACL to an interface, not the VTY lines.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I hope this helps anyone else out there that is currently looking for a solution to this problem.&lt;/P&gt;</description>
      <pubDate>Sun, 29 May 2016 20:00:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/1415548#M944317</guid>
      <dc:creator>justnetsolutions</dc:creator>
      <dc:date>2016-05-29T20:00:27Z</dc:date>
    </item>
    <item>
      <title>Re: I know this question was</title>
      <link>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/3175106#M944318</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Ok so in my case I have a router with mgmt interface (int mgmt 0) with ip address 192.168.1.1&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now I want that my network administrator sholuld telnet in to the router using only this int mgmt IP and Not any other loopback OR interface IP configured on the router ? How can I achive this ?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2017 09:36:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/3175106#M944318</guid>
      <dc:creator>Arjun Dabol</dc:creator>
      <dc:date>2017-08-24T09:36:50Z</dc:date>
    </item>
    <item>
      <title>Re: Access list isses on VTY lines</title>
      <link>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/3722453#M944319</link>
      <description>&lt;P&gt;I do not know if this you have figured out or not but always remember that vty lines are on the managment plane. The vty lines will always only allow or block traffic on the vty level session. Depending on what physical interfaces you have you will have to place ACLs on that to block traffic from coming into those physical interfaces first and if permitted they will make their way to the vty lines.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Oct 2018 07:19:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/3722453#M944319</guid>
      <dc:creator>Faizan Ahmed Khan</dc:creator>
      <dc:date>2018-10-10T07:19:33Z</dc:date>
    </item>
    <item>
      <title>Re: Access list isses on VTY lines</title>
      <link>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/4804862#M1099114</link>
      <description>&lt;P&gt;I have the same issue. okay so this is the configuration. The idea like someone on the forum mention I want to allow access from any source address to telnet to the switch but only access telnet through the Loopback address of the switch. No other interface. so below is the configuration that I used on a router and it worked with no issue. however when I added it to the switch this is the error I get "&amp;nbsp;*Mar 30 15:30:23.618: %SEC-6-IPACCESSLOGP: list VTY-ACCESS denied tcp 192.168.1.203(34788) -&amp;gt; 0.0.0.0(23), 1 packet"&amp;nbsp;&lt;/P&gt;&lt;P&gt;the traffic is not going to the loopback address it is going to 0.0.0.0 why?&lt;/P&gt;&lt;P&gt;interface Loopback0&lt;BR /&gt;ip address 1.1.1.2 255.255.255.255&lt;/P&gt;&lt;P&gt;ip access-list extended VTY-ACCESS&lt;BR /&gt;permit tcp any host 1.1.1.2 eq telnet 22 log&lt;BR /&gt;deny ip any any log&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;BR /&gt;access-class VTY-ACCESS in&lt;BR /&gt;logging synchronous&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 15:33:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/4804862#M1099114</guid>
      <dc:creator>csotolopez</dc:creator>
      <dc:date>2023-03-30T15:33:23Z</dc:date>
    </item>
    <item>
      <title>Re: Access list isses on VTY lines</title>
      <link>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/4984277#M1107243</link>
      <description>&lt;P&gt;hello friends I have made an acl to restrict vlans 102 , 103 to use telnet &amp;amp; ssh&amp;nbsp; and permit valn 100 the result I have done this but the problem is with vlan100 I can use telnet &amp;amp; ssh with router br1 &amp;amp; br2 but hq router I could not&amp;nbsp; the ping&amp;nbsp; with hq unreachable what is the problem?&lt;/P&gt;&lt;P&gt;BR1#sh ru&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Current configuration : 2429 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 15.4&lt;/P&gt;&lt;P&gt;no service timestamps log datetime msec&lt;/P&gt;&lt;P&gt;no service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;no service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname BR1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip cef&lt;/P&gt;&lt;P&gt;no ipv6 cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username cisco secret 5 $1$mERr$9cTjUIEqNGurQiFU.ZeCi1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip domain-name ccna.com&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;spanning-tree mode pvst&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0/0&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;ip ospf 20 area 0&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0/0.100&lt;/P&gt;&lt;P&gt;encapsulation dot1Q 100 native&lt;/P&gt;&lt;P&gt;ip address 192.168.100.1 255.255.255.240&lt;/P&gt;&lt;P&gt;ip ospf 20 area 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0/0.102&lt;/P&gt;&lt;P&gt;encapsulation dot1Q 102&lt;/P&gt;&lt;P&gt;ip address 192.168.100.65 255.255.255.224&lt;/P&gt;&lt;P&gt;ip helper-address 192.168.100.6&lt;/P&gt;&lt;P&gt;ip ospf 20 area 0&lt;/P&gt;&lt;P&gt;ip access-group 100 in&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0/0.103&lt;/P&gt;&lt;P&gt;encapsulation dot1Q 103&lt;/P&gt;&lt;P&gt;ip address 192.168.100.33 255.255.255.240&lt;/P&gt;&lt;P&gt;ip helper-address 192.168.100.6&lt;/P&gt;&lt;P&gt;ip ospf 20 area 0&lt;/P&gt;&lt;P&gt;ip access-group 100 in&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0/1&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0/2&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Serial0/1/0&lt;/P&gt;&lt;P&gt;ip address 10.10.10.2 255.255.255.252&lt;/P&gt;&lt;P&gt;ip ospf 20 area 0&lt;/P&gt;&lt;P&gt;clock rate 2000000&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Serial0/1/1&lt;/P&gt;&lt;P&gt;ip address 10.10.10.6 255.255.255.252&lt;/P&gt;&lt;P&gt;ip ospf 20 area 0&lt;/P&gt;&lt;P&gt;ip access-group 110 out&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan102&lt;/P&gt;&lt;P&gt;mac-address 00d0.ba41.0d01&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router ospf 20&lt;/P&gt;&lt;P&gt;log-adjacency-changes&lt;/P&gt;&lt;P&gt;default-information originate&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip flow-export version 9&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 100 deny tcp any host 10.10.10.5 eq 22&lt;/P&gt;&lt;P&gt;access-list 100 deny tcp any host 10.10.10.5 eq telnet&lt;/P&gt;&lt;P&gt;access-list 100 deny tcp any host 10.10.10.1 eq 22&lt;/P&gt;&lt;P&gt;access-list 100 deny tcp any host 10.10.10.1 eq telnet&lt;/P&gt;&lt;P&gt;access-list 100 deny tcp any host 192.168.100.1 eq 22&lt;/P&gt;&lt;P&gt;access-list 100 deny tcp any host 192.168.100.1 eq telnet&lt;/P&gt;&lt;P&gt;access-list 100 deny icmp any 192.168.100.0 0.0.0.15&lt;/P&gt;&lt;P&gt;access-list 100 permit ip any any&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any any&lt;/P&gt;&lt;P&gt;access-list 110 permit tcp any host 100.1.1.3 eq www&lt;/P&gt;&lt;P&gt;access-list 110 permit tcp any host 100.1.1.3 eq 443&lt;/P&gt;&lt;P&gt;access-list 110 permit tcp any host 100.1.1.2 eq smtp&lt;/P&gt;&lt;P&gt;access-list 110 permit tcp any host 100.1.1.2 eq pop3&lt;/P&gt;&lt;P&gt;access-list 110 deny tcp any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line vty 0&lt;/P&gt;&lt;P&gt;no login&lt;/P&gt;&lt;P&gt;transport input none&lt;/P&gt;&lt;P&gt;line vty 1 4&lt;/P&gt;&lt;P&gt;password cisco&lt;/P&gt;&lt;P&gt;login&lt;/P&gt;&lt;P&gt;transport input none&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt;password cisco&lt;/P&gt;&lt;P&gt;login&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Dec 2023 14:58:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/4984277#M1107243</guid>
      <dc:creator>knanyhy011</dc:creator>
      <dc:date>2023-12-24T14:58:59Z</dc:date>
    </item>
    <item>
      <title>Re: Access list isses on VTY lines</title>
      <link>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/4984292#M1107244</link>
      <description>&lt;P&gt;First i would suggest to open new thread with more information there on the new post&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;but the problem is with vlan100 I can use telnet &amp;amp; ssh with 
router br1 &amp;amp; br2 but hq router I could not  the ping  with hq unreachable what is the problem?&lt;/LI-CODE&gt;
&lt;P&gt;we do not understand what is HQ&amp;nbsp; IP address here - from what source are you using to reach HQ , where is&amp;nbsp; HQ device configuration here ?&lt;/P&gt;
&lt;P&gt;You have ACL here - which deny for IN&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;access-list 100 deny icmp any 192.168.100.0 0.0.0.15&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Dec 2023 15:41:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-isses-on-vty-lines/m-p/4984292#M1107244</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-12-24T15:41:33Z</dc:date>
    </item>
  </channel>
</rss>

