Appendix K Router Platform User Interface Reference

VTY Policy Page

Table K-58 VTY Line Dialog Box—Setup Tab (Continued)

Output Protocols

The protocols that you can use for outgoing connections on this line:

 

All—All supported protocols are permitted. Supported protocols

 

include LAT, MOP, NASI, PAD, rlogin, SSH, Telnet, and V.120.

 

None—No protocols are permitted. This makes the port unusable by

 

outgoing connections.

 

Protocol—Enables one or more of the following protocols:

 

SSH—Secure Shell protocol.

 

Telnet—Standard TCP/IP terminal emulation protocol.

 

rlogin—UNIX rlogin protocol.

 

Note SSH and rlogin require that you configure AAA authentication. See

 

 

VTY Line Dialog Box—Authentication Tab, page K-136.

 

Note Not all IOS Software Versions support rlogin as an output protocol.

 

 

Inbound Access List

The ACL that restricts incoming connections on this line. Enter the name of

 

an ACL object, or click Select to display an Object Selectors, page F-593.

 

If the extended ACL you want is not listed, click the Create button in the

 

selector to display the Add and Edit Extended Access List Pages, page F-34.

 

From here you can create an extended ACL object.

 

 

Permit VRF Interface

Applies only when an inbound ACL is defined on this line.

Connections

When selected, accepts incoming connections from interfaces that belong to

 

 

a VRF. When deselected, rejects incoming connections from interfaces that

 

belong to a VRF.

 

 

Outbound Access List

The ACL that restricts outgoing connections on this line. Enter the name of

 

an ACL object, or click Select to display an Object Selectors, page F-593.

 

If the extended ACL you want is not listed, click the Create button in the

 

selector to display the Add and Edit Extended Access List Pages, page F-34.

 

From here you can create an extended ACL object.

 

 

 

 

 

User Guide for Cisco Security Manager 3.2

 

 

 

 

 

 

OL-16066-01

 

 

K-135

 

 

 

Page 135
Image 135
Cisco Systems OL-16066-01 appendix 135