06-19-2013 11:11 PM - edited 03-07-2019 01:59 PM
Hi guys, I want the access-group below that can telnet the router. Is this command enough to make other IP restricted from defined IP below? Or should I put ip access-group 99 in at serial interface? Thanks.
access-list 99 permit 10.49.135.135
access-list 99 permit 172.20.251.49
access-list 99 permit 172.20.251.53
access-list 99 permit 10.63.205.69
access-list 99 permit 222.127.8.240 0.0.0.15
access-list 99 permit 10.49.172.240 0.0.0.15
access-list 99 permit 10.198.164.36 0.0.0.3
access-list 99 permit 10.198.164.164 0.0.0.3
line vty 0 4
access-class 99 in
exec-timeout 5 0
privilege level 15
password 7 011215015819031B75414B
logging synchronous
transport input telnet ssh
line vty 5 15
access-class 99 in
exec-timeout 5 0
privilege level 15
password 7 011215015819031B75414B
logging synchronous
transport input telnet ssh
Solved! Go to Solution.
06-19-2013 11:22 PM
Hello, this configuration is correct and will work fine for allowing telnet/ssh access to the permitted ip's in the access list. Anything else will be denied.
Hope this helps
Sent from Cisco Technical Support iPhone App
06-19-2013 11:22 PM
Hello, this configuration is correct and will work fine for allowing telnet/ssh access to the permitted ip's in the access list. Anything else will be denied.
Hope this helps
Sent from Cisco Technical Support iPhone App
06-20-2013 02:55 AM
Disclaimer
The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
Liability Disclaimer
In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
Posting
As Bilal has noted, your ACL, as applied to the VTY, will limit source IPs that are granted permission for VTY access.
However, depending on your router's exposure, you might still want to consider an ACL on your serial or other interfaces to protect what packets can even be directed to the router itself. When using an internal service based ACL, you might also want a similar ACL to restrict what IPs might be allowed to a service such as SNMP to your device.
A VTY or SNMP ACL only considers packets directed to that particular service.
An interface ACL would examine all packets hitting the interface and can selectively block before any internal or downstream device need to further process them.
Both approaches can protect your device. Which is "better" depends on what you believe your exposure is and how "efficiently" it might preclude that access.
Sometimes you might use both. For example, an interface ACL might block all Telnet packets from the "outside" interface, while the VTY ACL controls what "inside" IPs are granted access to the VTY service. Or you might want to block Telnet from the "outside" yet allow SSH from the "outside".
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide