If you are trying to limit access on connections to the vty lines then you should use a standard access list. Your config will look like the following:
access-list 1 permit 192.168.1.0 0.0.6.255 line vty 0 4 transport input telnet access-class 1 in If you are trying to limit access for telnet sessions originating from your router connecting to other devices; then your config will look like this: access-list 1 permit 192.168.1.0 0.0.6.255 access-list 1 permit 192.168.1.0 0.0.6.255 line vty 0 4 transport input telnet transport output telnet access-class 1 out The reasoning here is that you dont need to go so far as to specify the transport protocol with an extended ACL when you can simply disable all other transport types on your VTYs and have fewer ACL headaches. You can combine these techniques to limit telnet sessions both inbound and outbound, but be careful not to "lock your keys in the car"! Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=45615&t=45585 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

