This will block all traffic from outside of router1 destined to the telnet server. For example: access-list 101 remark -Outside interface inbound. In my example, I just applied it to the default vty lines that are on most Cisco devices.Įdit: Just saw the image link in a comment on the other answer and this seems to indicate you have an actual server designated for providing telnet access, rather than looking to limit telnet to the Cisco devices themselves.įor this, the ACL as suggested in the other answer would be best applied to the outside interface of router1. You don't need the last line, as there is an implicit (assumed) deny at the end of a standard access list, but I personally like to make it explicit and to log violations.įrom there, on your vty lines add the access-class statement: line vty 0 4 For example: access-list 10 remark -Restrict Telnet Access-Īccess-list 10 permit 192.168.10.0 0.0.0.255 First, you need to create a standard access list.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |