Re: Securing Telnet access

From: ccie (ccie@gannons.net)
Date: Sat Oct 30 2004 - 10:51:11 GMT-3


Method 1 depending on the platform would/could be a lot more CPU intensive
as you must inspect all packets.

Regards,
Kevin

>Hi guys,
>
>What's the a difference or benefit to securing telnet access between these 2
>methods?
>
>Method 1
>
>Applying a deny telnet acl to all the physical interfaces
>
>Method 2
>
>Applying a deny telnet acl to line vty 0 4
>
>To me, the only difference I can see is that with method 1, I would need to
>type (or cut and paste) a bit more. Besides that, is there anything else or
>would either method be considered equally suitable?
>
>TIA, Tim
>
>_______________________________________________________________________
>Subscription information may be found at:
>http://www.groupstudy.com/list/CCIELab.html



This archive was generated by hypermail 2.1.4 : Sat Nov 06 2004 - 17:11:54 GMT-3