ACLs for Telnet...whats the point?
The Prize Is Lobster
Member Posts: 71 ■■□□□□□□□□
in CCNA & CCENT
Maybe I am missing something on this but from my understanding, restricting access to a telnet connection via ACL seems a bit unnecessary. If you only wanted administrative telnet access to a router, its assumed the router would be password protected initially anyway, and it requires including all administrators IPs in the Access List which would require static IPs on all admin workstations, etc. Bleh....am I overlooking something here?
Comments
-
dtlokee Member Posts: 2,378 ■■■■□□□□□□The point is multiple lines of defense. If you simpy rely on passwords they can be broken, if you add an access list to restrict what ip addresses can even create a connection you have added an additional layer of security. In many cases (in our NOC for example) all the admin workstations are on the same VLAN so restricting access is easily accomplished. Sometimes the NOC workstations are all translated using NAT to provide additional security so you would simply use an access-list to allow the dynamic NAT poolThe only easy day was yesterday!
-
Webmaster Admin Posts: 10,292 AdminSecurity, when properly implemented, is implemented in layers. Just because it already has a password doesn't mean you shouldn't use additional means to secure administrative access (and use ACL's, and SSH instead of Telnet for example)It requires including all administrators IPs in the Access List which would require static IPs on all admin workstations.
-
Webmaster Admin Posts: 10,292 AdminAh, I see dtlokee already posted something similar, that's why I normally press the Preview button before submitting a reply... well, it's a point worth stressing.
-
Paul#4 Inactive Imported Users Posts: 57 ■■□□□□□□□□More security is usually better if implemented properly.
Restricting telnet access with ACL's provides extra security for various reasons.
What if you want site admins to telnet only from work ?
What if your company uses the same password for all routers, but want to restrict other admins from accessing this particular router?
What happens if a hacker gets the password(ex-employee), but he cannot telnet to the router because of an ACL.
These things seem marginal but are very important when securing a cisco router.
Just think...more security is usually better.Gimme gimme gimme -
The Prize Is Lobster Member Posts: 71 ■■□□□□□□□□That makes sense.
actually after posting this I remembered that when I worked net support some years back, all of our workstations were on static IPs. -
Webmaster Admin Posts: 10,292 AdminPaul#4 wrote:more security is usually better.
-
Rearden Member Posts: 222For example, we keep all of our switches in a VLAN that also uses 10.x.x.x addresses. This way, only the machines in that VLAN can access them. We STILL use ACLS to prevent someone from plugging a machine into a port that someone accidentally left in the management VLAN and being able to try and telnet to our switches.More systems have been wiped out by admins than any cracker could do in a lifetime.
-
sprkymrk Member Posts: 4,884 ■■■□□□□□□□Restricting telnet via ACL also forces admins to use a secure protocol (SSH for instance) to manage the device, so as to avoid sending passwords in clear text across the network.
This may have already been mentioned above, but most of the posts emphasize "layered security" as the primary reason (which is not incorrect), so I just wanted to point out another reason in case it wasn't obvious.All things are possible, only believe. -
Paul#4 Inactive Imported Users Posts: 57 ■■□□□□□□□□Webmaster wrote:Paul#4 wrote:more security is usually better.
That's true, there are some unreasonable security demands.
Implementing an ACL on telnet is standard and worth it.
If you just follow Cisco's recommeneded methods 9 out of 10 times you will be right.
There is a right way and wrong way to do most things in networking.
Finding the right way is sometimes difficult.Gimme gimme gimme -
Webmaster Admin Posts: 10,292 AdminPaul#4 wrote:Implementing an ACL on telnet is standard and worth it.sprkymrk wrote:Restricting telnet via ACL also forces admins to use a secure protocol (SSH for instance) to manage the device, so as to avoid sending passwords in clear text across the network.
-
erikd65 Member Posts: 18 ■□□□□□□□□□We have one router in the field that some bozo kept (and still keeps trying) to break the login, so I applied access lists to all the vty lines... problem solved. Its just another line of defense.
I also run AAA via TACACS+ on an ACS server as well. -
Paul Boz Member Posts: 2,620 ■■■■■■■■□□Well, my reasoning is that hey, it's a valid feature put there, so why not? I like playing with IOS and configuring things just for the sake of doing it. The added level of security is worth it, but make sure you can remote to a device (home or work PC) that has an allowed IP address because if you're on the road and want to manage your router or network and try to login via a non-allowed IP address you're SOL.CCNP | CCIP | CCDP | CCNA, CCDA
CCNA Security | GSEC |GCFW | GCIH | GCIA
pbosworth@gmail.com
http://twitter.com/paul_bosworth
Blog: http://www.infosiege.net/ -
Chivalry1 Member Posts: 569DEFENSE IN-DEPTH!!
BTW, if your Cisco IOS supports it please use SSH to avoid Man-In-the-Middle attacks."The recipe for perpetual ignorance is: be satisfied with your opinions and
content with your knowledge. " Elbert Hubbard (1856 - 1915)