Verifying the VTY Port is Secured

In this article we will discuss The access-class Command, will make brief discussion on The access-class Command, In last article we discuss about ACL Statistics.

After the ACL to restrict access to the VTY lines is configured, it is important to verify that it is working as expected. The figure shows two devices attempting to connect to R1 using SSH.

Access list 21 has been configured on the VTY lines on R1. PC1 is successful while PC2 fails to establish a SSH connection. This is the expected behavior, as the configured access list permits VTY access from the network while denying all other devices.

The output for R1 shows the result of issuing the show access-lists command after the SSH attempts by PC1 and PC2. The match in the permit line of the output is a result of a successful SSH connection by PC1. The match in the deny statement is due to the failed attempt to create an SSH connection by PC2, a device on the network.

Add a Comment

Your email address will not be published. Required fields are marked *