Configuring the VTY Lines Access Control List | Free CCNA Workbook (2024)

When it comes to mgmt traffic, you want to ensure that ONLY authorized host even have the ability to access the device. This lab will discuss and demonstrate the configuration and verification of applying an ACL to the VTY Lines.

Real World Application

In production networks it’s a common security policy to control remote administration to network devices using an access control list specifying only a particular administrative subnets and/or hosts on the network access to establish a remote exec session to the device for management.

This lab will teach you how to configure an ACL to control specific networks and/or host access to establish an exec session via VTY lines used for remote administration.

Lab Prerequisites

  • If you are using GNS3 than load the Free CCNA Workbook GNS3 topology than start devices start R1, R2, R3 and SW1.
  • Establish a console session with devices R1, R2, R3 and SW1 than configure their respected host names.
  • Configure the IP address 10.1.1.1/24 on the FastEthernet0/0 interface of R1.
  • Configure the IP address 10.1.1.2/24 on the FastEthernet0/0 interface of R2.
  • Configure the IP address 10.1.1.3/24 on the FastEthernet0/0 interface of R3
  • Configure a local username and password on R1 with level 15 privileges which will be used to authenticate VTY exec sessions locally.
  • Configure R1 to accept both Telnet and SSH sessions.

Lab Objectives

  • Create a named extended access-list called VTY_ACCESS
  • Deny host 10.1.1.3 from accessing the vty lines via telnet.
  • Permit the network range 10.1.1.0/24 to use telnet or ssh
  • Deny all other traffic and log the denied attempted connections.
  • Configure the access-list on the vty lines using the access-class command.
  • Verify your configuration and connectivity using R2 and R3.

Lab Instruction

One of the biggest new management features of 12.3T and 12.4 mainline is the ability to use extended access-lists to permit particular traffic to establish an exec session to the vty lines of a Cisco device using a particular protocol; ie, telnet and/or ssh.

Step 1. – Configure a named access-list on R1 called VTY_ACCESS

R1 con0 is now availablePress RETURN to get started.R1>enableR1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.R1(config)#ip access-list extended VTY_ACCESSR1(config-ext-nacl)#

Step 2. – Deny host 10.1.1.3 from accessing the vty lines via telnet. In order to complete this objective you’ll need to specify the source as host 10.1.1.3 and destination as any eq telnet as shown below;

R1(config-ext-nacl)#10 deny tcp host 10.1.1.3 any eq telnet
Read Me

When traffic is destined to the control plane of the device, in an ACL it is represented as 0.0.0.0/0; AKA: any

Step 3. – Permit the network range 10.1.1.0/24 to use telnet or ssh. This objective will require two access list entries, one for telnet (tcp port 23) and one for ssh (tcp port 22) as shown below;

R1(config-ext-nacl)#20 permit tcp 10.1.1.0 0.0.0.255 any eq 22R1(config-ext-nacl)#30 permit tcp 10.1.1.0 0.0.0.255 any eq 23

Step 4. – Deny all other traffic and log the denied connection attempts.

R1(config-ext-nacl)#500 deny ip any any log

Step 5. – Configure the access-list on the vty lines using the access-class command.

R1(config-ext-nacl)#line vty 0 4R1(config-line)#access-class VTY_ACCESS inR1(config-line)#endR1#

Step 6. – Verify your configuration and connectivity using R2 and R3.

Before verifying the connectivity using R2 and R3 first be sure to verify your access-list on R1 using the show ip access-list

R1#show access-listExtended IP access list VTY_ACCESS 10 deny tcp host 10.1.1.3 any eq telnet 20 permit tcp 10.1.1.0 0.0.0.255 any eq 22 30 permit tcp 10.1.1.0 0.0.0.255 any eq telnet 500 deny ip any any logR1#

After verifying the access-list is correct, you can then test connectivity to R1 from R2 using Telnet and/or SSH. Keep in mind when you Telnet or SSH from a Cisco device it will use the IP address of the interface that traffic exits to get to that destination, in this case 10.1.1.2/24 as shown below by the show users command;

R2#telnet 10.1.1.1Trying 10.1.1.1 ... OpenUser Access VerificationUsername: tomPassword: R1#show users Line User Host(s) Idle Location 0 con 0 idle 00:14:12 * 2 vty 0 tom idle 00:00:00 10.1.1.2 Interface User Mode Idle Peer AddressR1#exit[Connection to 10.1.1.1 closed by foreign host]R2#ssh -l tom 10.1.1.1Password: R1#sh sshConnection Version Mode Encryption Hmac State Username0 1.99 IN aes128-cbc hmac-sha1 Session started tom0 1.99 OUT aes128-cbc hmac-sha1 Session started tom%No SSHv1 server connections running.R1#

Now using R3 verify that 10.1.1.3/24 is being denied access via telnet and permitted access via SSH to R1 as shown below;

R3#telnet 10.1.1.1Trying 10.1.1.1 ... % Connection refused by remote hostR3#ssh -l tom 10.1.1.1Password: R1#show sshConnection Version Mode Encryption Hmac State Username0 1.99 IN aes128-cbc hmac-sha1 Session started tom0 1.99 OUT aes128-cbc hmac-sha1 Session started tom%No SSHv1 server connections running.R1#show users Line User Host(s) Idle Location 0 con 0 idle 00:13:53 * 2 vty 0 tom idle 00:00:00 10.1.1.3 Interface User Mode Idle Peer AddressR1#

You can verify that telnet was indeed denied using the vty line ACL on R1 by executing the show access-list command in privileged mode. This will show you a hit count number beside each access control list entry;

R1#show access-listExtended IP access list VTY_ACCESS 10 deny tcp host 10.1.1.3 any eq telnet (1 match) 20 permit tcp 10.1.1.0 0.0.0.255 any eq 22 (4 matches) 30 permit tcp 10.1.1.0 0.0.0.255 any eq telnet (6 matches) 500 deny ip any any logR1#

◄ Previous Lab

Next Lab ►

Configuring the VTY Lines Access Control List | Free CCNA Workbook (2024)
Top Articles
Introductory post - Chapter 1 of my guide: "Crypto investing for dummies" — Steemit
9 Best Small-Business Credit Cards – Reviews & Comparison
Craigslist Cars Augusta Ga
Form V/Legends
Usborne Links
Rainbird Wiring Diagram
Kentucky Downs Entries Today
New Day Usa Blonde Spokeswoman 2022
Shariraye Update
Guardians Of The Galaxy Vol 3 Full Movie 123Movies
Cooking Fever Wiki
Wizard Build Season 28
Steamy Afternoon With Handsome Fernando
DoorDash, Inc. (DASH) Stock Price, Quote & News - Stock Analysis
Talbots.dayforce.com
UPS Store #5038, The
Sodium azide 1% in aqueous solution
2021 Volleyball Roster
If you have a Keurig, then try these hot cocoa options
Myql Loan Login
4Oxfun
Lindy Kendra Scott Obituary
Tom Thumb Direct2Hr
Santa Barbara Craigs List
N.J. Hogenkamp Sons Funeral Home | Saint Henry, Ohio
Desales Field Hockey Schedule
Wisconsin Volleyball Team Leaked Uncovered
Swgoh Boba Fett Counter
Clearvue Eye Care Nyc
Mbi Auto Discount Code
Phone number detective
Craigslist Albany Ny Garage Sales
Maybe Meant To Be Chapter 43
Arcane Odyssey Stat Reset Potion
Cl Bellingham
Geology - Grand Canyon National Park (U.S. National Park Service)
Bernie Platt, former Cherry Hill mayor and funeral home magnate, has died at 90
How to play Yahoo Fantasy Football | Yahoo Help - SLN24152
Firestone Batteries Prices
Displacer Cub – 5th Edition SRD
Premiumbukkake Tour
Star Sessions Snapcamz
Smoke From Street Outlaws Net Worth
Gummy Bear Hoco Proposal
Wera13X
Helpers Needed At Once Bug Fables
Access One Ummc
Famous Dave's BBQ Catering, BBQ Catering Packages, Handcrafted Catering, Famous Dave's | Famous Dave's BBQ Restaurant
Www Extramovies Com
Mast Greenhouse Windsor Mo
Les BABAS EXOTIQUES façon Amaury Guichon
E. 81 St. Deli Menu
Latest Posts
Article information

Author: Zonia Mosciski DO

Last Updated:

Views: 6562

Rating: 4 / 5 (51 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Zonia Mosciski DO

Birthday: 1996-05-16

Address: Suite 228 919 Deana Ford, Lake Meridithberg, NE 60017-4257

Phone: +2613987384138

Job: Chief Retail Officer

Hobby: Tai chi, Dowsing, Poi, Letterboxing, Watching movies, Video gaming, Singing

Introduction: My name is Zonia Mosciski DO, I am a enchanting, joyous, lovely, successful, hilarious, tender, outstanding person who loves writing and wants to share my knowledge and understanding with you.