23-19
Cisco Router and Security Device Manager Version 2.2 Users Guide
OL-4015-08
Chapter23 Router Properties
VTYs
can create a security risk because if source is any it allows traffic from any
network to enter the router, or if destination is any it allows access to any node
on the network that the local router supports.
You can remove the access entry that caused this message to appear by selecting
the rule in the Rules window and clicking Edit. Or, you can disassociate the rule
from the interface it is applied to in the Interfaces and Connections window.
SDM Warning: Unsupported Access Control Entry
A management policy will be read only if unsupported access control entries
(ACEs) are associated with the interface or vty line to which you applied the
management policy. You can use the CLI to remove the unsupported ACEs.
Unsupported ACEs are those that contain keywords or syntax that SDM does not
support.
SDM Warning: SDM Not Allowed
This message is displayed if you still have not configured a management access
policy to allow a host or network to access SDM on this router. It is essential to
provide such a policy in order to make SDM on this router accessibl e.
You cannot navigate to other features or deliver commands to the router until you
configure a management access policy to allow access to SDM for a host or
network.
SDM Warning: Current Host Not Allowed
This message is displayed if you have not configured a management access poli cy
to allow the current host or network to access SDM on this router. You should
create such a policy in order to make SDM on this router acc essible from the
current host or network. If you dont, you will lose the connection to the router
when you deliver the configuration to the router.
Click Yes to add to a management access policy now for the current host or
network.
Click No to proceed without adding a policy for the current host or network. You
will lose contact with the router during command delivery, and you will have to
log on to SDM using a different host or network.