Restricting Inbound Telnet Access
Problem
You want to restrict Telnet access to the router to allow only particular workstations.
Solution
You can restrict which IP addresses can access the router as follows:
Router1#configure terminalEnter configuration commands, one per line. End with CNTL/Z. Router1(config)#access-list99permitRouter1(config)#172.25.1.0 0.0.0.255access-list99deny any logRouter1(config)#line vtyRouter1(config-line)#0 4access-class99inRouter1(config-line)#exitRouter1(config)#endRouter1#
This example uses a standard access-list. You can also use extended access-lists in an access-class statement. But because you already know the TCP port numbers, as well as the source and destination IP addresses, extended access-lists don’t give much extra functionality.
Discussion
Telnet is an inherently insecure protocol because it sends passwords over the network in clear text. We highly recommend using access-class statements to help to ensure that only authorized users can access router VTYs. These access-class statements do not secure the Telnet protocol itself, but they will prevent unauthorized users from receiving a router login prompt. Even if someone manages to sniff your router passwords, this will make them virtually useless.
For increased security, limit the permitted hosts to a few network management servers. This will force legitimate users to follow a two-stage authentication process to access your routers. They will need to authenticate their session on ...