cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
819
Views
0
Helpful
2
Replies

Defining Access-List (Telnet Restrictions)

Josiah Inubio
Level 1
Level 1

Hi guys, I want the access-group below that can telnet the router. Is this command enough to make other IP restricted from defined IP below? Or should I put ip access-group 99 in at serial interface? Thanks.

access-list 99 permit 10.49.135.135

access-list 99 permit 172.20.251.49

access-list 99 permit 172.20.251.53

access-list 99 permit 10.63.205.69

access-list 99 permit 222.127.8.240 0.0.0.15

access-list 99 permit 10.49.172.240 0.0.0.15

access-list 99 permit 10.198.164.36 0.0.0.3

access-list 99 permit 10.198.164.164 0.0.0.3

line vty 0 4

access-class 99 in

exec-timeout 5 0

privilege level 15

password 7 011215015819031B75414B

logging synchronous

transport input telnet ssh

line vty 5 15

access-class 99 in

exec-timeout 5 0

privilege level 15

password 7 011215015819031B75414B

logging synchronous

transport input telnet ssh

1 Accepted Solution

Accepted Solutions

Bilal Nawaz
VIP Alumni
VIP Alumni

Hello, this configuration is correct and will work fine for allowing telnet/ssh access to the permitted ip's in the access list. Anything else will be denied.

Hope this helps

Sent from Cisco Technical Support iPhone App

Please rate useful posts & remember to mark any solved questions as answered. Thank you.

View solution in original post

2 Replies 2

Bilal Nawaz
VIP Alumni
VIP Alumni

Hello, this configuration is correct and will work fine for allowing telnet/ssh access to the permitted ip's in the access list. Anything else will be denied.

Hope this helps

Sent from Cisco Technical Support iPhone App

Please rate useful posts & remember to mark any solved questions as answered. Thank you.

Joseph W. Doherty
Hall of Fame
Hall of Fame

Disclaimer

The  Author of this posting offers the information contained within this  posting without consideration and with the reader's understanding that  there's no implied or expressed suitability or fitness for any purpose.  Information provided is for informational purposes only and should not  be construed as rendering professional advice of any kind. Usage of this  posting's information is solely at reader's own risk.

Liability Disclaimer

In  no event shall Author be liable for any damages whatsoever (including,  without limitation, damages for loss of use, data or profit) arising out  of the use or inability to use the posting's information even if Author  has been advised of the possibility of such damage.

Posting

As Bilal has noted, your ACL, as applied to the VTY, will limit source IPs that are granted permission for VTY access.

However, depending on your router's exposure, you might still want to consider an ACL on your serial or other interfaces to protect what packets can even be directed to the router itself.  When using an internal service based ACL, you might also want a similar ACL to restrict what IPs might be allowed to a service such as SNMP to your device.

A VTY or SNMP ACL only considers packets directed to that particular service.

An interface ACL would examine all packets hitting the interface and can selectively block before any internal or downstream device need to further process them.

Both approaches can protect your device.  Which is "better" depends on what you believe your exposure is and how "efficiently" it might preclude that access.

Sometimes you might use both.  For example, an interface ACL might block all Telnet packets from the "outside" interface, while the VTY ACL controls what "inside" IPs are granted access to the VTY service.  Or you might want to block Telnet from the "outside" yet allow SSH from the "outside".