If you are trying to limit access on connections to the vty lines then you
should use a standard access list.
Your config will look like the following:

access-list 1 permit 192.168.1.0 0.0.6.255
line vty 0 4
transport input telnet
access-class 1 in


If you are trying to limit access for telnet sessions originating from your
router connecting to other devices; then your config will look like this:

access-list 1 permit 192.168.1.0 0.0.6.255
access-list 1 permit 192.168.1.0 0.0.6.255
line vty 0 4
transport input telnet
transport output telnet
access-class 1 out

The reasoning here is that you dont need to go so far as to specify the
transport protocol with an extended ACL when you can simply disable all
other transport types on your VTYs and have fewer ACL headaches.

You can combine these techniques to limit telnet sessions both inbound and
outbound, but be careful not to "lock your keys in the car"!


Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=45615&t=45585
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to