how can we block remote desktop for some user from cisco
router through aaccess-list
Answers were Sorted based on User's Feedback
Answer / jitendra
I think this should be command are you agree with this or not
router(config)#access-list 101 deny tcp 10.0.0.0 255.0.0.0 host 172.16.100.10 eq 3389
router(config)#access-list 101 permit tcp any any
router(config)#access-list 101 permit icmp any any
router(config)#interface gi0/0
router(config-if)#ip access-group 101 out
Is This Answer Correct ? | 5 Yes | 3 No |
Answer / sudhir.sancheti
HI,
I think It will work, as u r smartly blocking access for the service to the desired users.
need to confirm the port no of the service and the Interface on which u are going to apply the ACL
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / jitendra
Hi Dharemendara
i am not asking about telnet access
look the problem like that we have a router which is core router from this core router another router is connected through serial interface and gigabyte Ethernet interface.the one router which is connected through the s0 of core router having the fa/0/0 ip 10.x.x.x
now from the core router g1/0 one switch is connected from that switch min e server 172.16.20.5 is connected
right now ever user can take the remote desktop of particular server but i want to block this mstsc (remote desktop)for some user which a hveing ip of 10.x.x.x series
now tell me how can we do it.
i need to this work very soon plz reply as soon as possible
Is This Answer Correct ? | 1 Yes | 0 No |
Answer / ankit singla
router>enable
router#config terminal
router(config)#access-list 101 deny tcp 10.10.10.0
0.0.0.255 10.10.20.0 0.0.0.255 eq 21
router(config)#access-list 101 permit tcp any any
router(config)#interface fastethernet 0/0
router(config-if)#ip access-group 101 in
router(config-if)#exit
router(config)#
Is This Answer Correct ? | 1 Yes | 1 No |
Answer / dharmendra kumar soni
Hi
Remotely accessing routers is through of telnet gives us
easy access to our routers from almost anywhere. This is
done through the use of access control lists standard access
list
r1(config)#access-list 10 permit 10.10.206.3 255.255.255.255
r1(config)#access-list 10 permit 10.10.206.4 255.255.255.255
r1(config)#access-list 10 deny any
r1(config)#line vty 0 4
r1(config)#access-class 10 in
in above command restricted to telnet command particular two
ip add that means two can't access anything else
Is This Answer Correct ? | 2 Yes | 3 No |
What is the syntax to add a banner to the Cisco router? A.) motd banner # B.) banner C.) banner motd # D.) banner #
What will happen in OSPF, While a new highet priority DR joining in already running area.That area already having DR and BDR.
Identify the components in the following command 'interface serial0/1/1' A.) Serial interface, port number 0, slot 1, port adapter 1 B.) Serial interface, slot 1, port number 1, port adapter 0 C.) Serial interface, slot 0, port adapter 1, port number 1
What are the three sources of signal degradation on a data link?
Identify the 3 methods routers learn paths to destinations? A.) Dynamic routing B.) None of the above, configured by default C.) Default routes D.) Administrative distance E.) Static routes
What is the IP extended access list range? A.) 1000-1099 B.) 100-199 C.) 1-99 D.) 101-200
The Datalink Layer is broken down into 2 layers, LLC and MAC. The LLC establishes media independence and what else? A.) Provides Windowing. B.) Provides flow control. C.) Provides SAP's (Service Access Points). D.) The Datalink layer does not have sublayers. E.) Provides SAP's (Service Advertising Protocol). F.) RIP Updates.
comparative networking features windows linux
Explain what are the ranges of private ips?
IP standard access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) port C.) protocol D.) source address
Which protocol works only on cisco routers?
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity