When configuring router security, which statement describes the most effective way to use ACLs to control Telnet traffic that is destined to the router itself?
- The ACL must be applied to each vty line individually.
- The ACL is applied to the Telnet port with the ip access-group command.
- The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.
- Apply the ACL to the vty Ilines without the in or out option required when applying ACLS to interfaces.
Explanation: Because someone from outside the router is trying to use a protocol such as Telnet or SSH to gain access to the router, the ACL direction has to be inward into the router through the vty lines.
Exam with this question: CCNA 3 v7 Module 5 Quiz - ACLs for IPv4 Configuration
Exam with this question: CCNA Security Final Exam (CCNAS v1.2)
Please login or Register to submit your answer