wastedtime wrote: » It looks good to me although you don't need the deny statement. I would double check that what you have here looks that way on the router, and that the IP addresses are right.
wastedtime wrote: » If you need to deny telnet access to a router you can do it through the access-class under the vty. If you do it under a interface you will block traffic for the interface and not just the vty line. The reason you didn't need the deny statement was due to the implicit deny all at the end of the ACL.
wastedtime wrote: » I think you got the part about the deny all in the access-list but I am not sure about where to apply it. If you are just trying to apply it to the one router then the best method would be to go from global config: Router(config)#line vty 0 15 Router(config-line)#access-class 10 in Also you wouldn't need a extended access-list this way a standard would work as the router would only check the access-list when a vty connection is attempted. Also here is a link to relevant Cisco documentation. Controlling Access to a Virtual Terminal Line* [Cisco IOS and NX-OS Software] - Cisco Systems
Router(config)#ip access-list extended RestrictTelnetIn Router(config-ext-nacl)# permit tcp host 192.168.3.7 host 192.168.4.2 eq telnet Router(config-ext-nacl)# permit tcp any any neq telent Router(config-ext-nacl)# exit Router(config)# line vty 0 15 Router(config-line)# access-class RestrictTelnetIn in Router(config)# end Router# wr mem
cjthedj45 wrote: » Woohoo Thanks a lot. Looks like the standard list was the way to go. I used a standard acl to permit the host address 192.168.3.7. I then used the access-class command and this worked. The implicit deny seems to deny all other telnet traffic apart from the host I permitted. look at those matches thats me succesfully telnetting to the router MK#sh access-lists Standard IP access list 1 permit host 192.168.3.7 (4 match(es)) Many Thanks for helping me through my studies this afternoon. I just had to get that sorted as it was bugging me. Right I'm on to NAT/PAT revision now.
shednik wrote: » I had to do something similar to this at work for an audit to block telnet I would do something like this Router(config)#ip access-list extended RestrictTelnetIn Router(config-ext-nacl)# permit tcp host 192.168.3.7 host 192.168.4.2 eq telnet Router(config-ext-nacl)# permit tcp any any neq telent Router(config-ext-nacl)# exit Router(config)# line vty 0 15 Router(config-line)# access-class RestrictTelnetIn in Router(config)# end Router# wr mem That would be one way to do it and you can change the first permit to any for the destination if you want more then 1 interface to be accessible for management. Hope this helps!