成熟丰满熟妇高潮XXXXX,人妻无码AV中文系列久久兔费 ,国产精品一国产精品,国精品午夜福利视频不卡麻豆

您好,歡迎來到九壹網(wǎng)。
搜索
您的當(dāng)前位置:首頁setupLock&KeyACL

setupLock&KeyACL

來源:九壹網(wǎng)

username foobar password cisco ! int s0 ip address 1.1.1.1 255.255.0.0 ip access-group 101 in ! /* or port 22 for ssh */ access-list 101 permit tcp any host 1.1.1.1 eq telnet access-list 101 dynamic foobar permit ip any any ! line vty 0 2 l

username foobar password cisco

!

int s0

ip address 1.1.1.1 255.255.0.0

ip access-group 101 in

! /* or port 22 for ssh */

access-list 101 permit tcp any host 1.1.1.1 eq telnet

access-list 101 dynamic foobar permit ip any any

!

line vty 0 2

login local

autocommand access-enable host timeout 5

line vty 3 4

login local

rotary 1

The first access list allows telnet into the router. Your users will

telnet into router and authenticate with username foobar and password

"cisco"

The router will then immediately disconnect the telnet session. When

they successfully authenticate, an access list with their source IP will

be added to the dynamic list. Basically, if they authenticate correctly,

they can come in to the inside network. After 5 mins of inactivty the

entry will be deleted from the access list.

The vty 3 and 4 are using the rotary command so that you can telnet to

your router with the command: "telnet 1.1.1.1 3001" This takes you to

vty 3 (or 4). This way, you can telnet into the router and actually

manage it. A very subtle but VERY important point. If you forget this,

you'll be making a trip to use the console port.

Copyright ? 2019- 91gzw.com 版權(quán)所有 湘ICP備2023023988號-2

違法及侵權(quán)請聯(lián)系:TEL:199 1889 7713 E-MAIL:2724546146@qq.com

本站由北京市萬商天勤律師事務(wù)所王興未律師提供法律服務(wù)