When configuring router security, which statement describes the most effective way to use ACLs to control Telnet traffic that is destined to the router itself?

IT Questions BankCategory: CCNAWhen configuring router security, which statement describes the most effective way to use ACLs to control Telnet traffic that is destined to the router itself?

When configuring router security, which statement describes the most effective way to use ACLs to control Telnet traffic that is destined to the router itself?

  • The ACL must be applied to each vty line individually.
  • The ACL is applied to the Telnet port with the ip access-group command.
  • The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.
  • Apply the ACL to the vty Ilines without the in or out option required when applying ACLS to interfaces.

Explanation: Because someone from outside the router is trying to use a protocol such as Telnet or SSH to gain access to the router, the ACL direction has to be inward into the router through the vty lines.

Exam with this question: CCNA 3 v7 Module 5 Quiz - ACLs for IPv4 Configuration
Exam with this question: CCNA Security Final Exam (CCNAS v1.2)

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x