Compare cert salaries and plan your next career move
Dubuku57 wrote: » Okay sorry din put that info in, I would apply this ACL on the inside interface of the router, say smth like int f0/1 ip access-group 101 in Then only the telnetting traffic from inside the network would be denied right? Would the returning telnetting traffic be denied too?
sandman748 wrote: » This is the same question as in your other thread, which I see died without an answer. This has got me wondering as well. With the access list as is; telnet traffic for network A destined for network B will be dropped at the interface with the ACL applied. But what If network B tries to telnet to Network A. The packets would make it to from network B to network A, but would the return traffic be allowed or would it match the ACL on the way back? Can we use the established key word at the end of an ACL for telnet traffic? If we can, and put that at the top of the ACL, it should allow the traffic to return. I know we can do it for http, just not sure about about telnet. Just to clarify, I don't think he is trying to restrict telnet traffic to a router. He's just trying to set this up between hosts, assuming that they are all set up for telnet.
Dubuku57 wrote: » Yes Sandman, ur right the thread sorta died so started a new one Thanks guys, i think i get it- the ACL looks at the port numbers for tcp traffics and uses that to determine what goes through and does not. This woul dbe the case for HTTP also? In this case the 'established' command would not be needed at all right? So, if this was a NAT case, would the and im applying a std list to an inside source, would the returning traffic b denied also?
Compare salaries for top cybersecurity certifications. Free download for TechExams community.