guides:user:compliance:examples:remote_acl
Differences
This shows you the differences between two versions of the page.
| guides:user:compliance:examples:remote_acl [2022/04/29 08:38] – created pgels | guides:user:compliance:examples:remote_acl [2024/07/03 12:31] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| + | ======Verify that remote access acl is configured ====== | ||
| + | |||
| + | Configuring VTY access control restricts remote access to only those authorized to manage | ||
| + | the device and prevents unauthorized users from accessing the system. | ||
| + | Below example helps in validating remote access acl is configured using NetYCE Compliance module. | ||
| + | |||
| + | ===Example config=== | ||
| + | |||
| + | campus01-b02-access01 and campus01-b02-access02 are the two reference devices which we are using for this example. | ||
| + | |||
| + | Below command output gives us the information. | ||
| + | |||
| + | ==campus01-b02-access01# | ||
| + | |||
| + | {{: | ||
| + | |||
| + | ==campus01-b02-access02# | ||
| + | |||
| + | {{: | ||
| + | |||
| + | ===How its done=== | ||
| + | Below are the steps to create new policy. | ||
| + | //Operate -> Compliance -> Policies -> New->// | ||
| + | {{: | ||
| + | |||
| + | Click on the Node Group to select the relevant group of devices to add: | ||
| + | {{: | ||
| + | |||
| + | //Rule -> New// | ||
| + | |||
| + | {{: | ||
| + | {{: | ||
| + | |||
| + | ===Report/ | ||
| + | |||
| + | //Operate -> Compliance -> Reports -> New -> Report Name “test” -> Report type “Policies” -> Policy Name “Sample1 : Verify ACL for remote access” -> Show Report// | ||
| + | |||
| + | {{: | ||
| + | |||
| + | |||
| + | This was a simple example to understand how to implement compliance policy to verify vty acl configuration. | ||
| + | |||