guides:user:compliance:examples:remote_acl
Differences
This shows you the differences between two versions of the page.
guides:user:compliance:examples:remote_acl [2022/04/29 08:38] – created pgels | guides:user:compliance:examples:remote_acl [2024/07/03 12:31] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ======Verify that remote access acl is configured ====== | ||
+ | |||
+ | Configuring VTY access control restricts remote access to only those authorized to manage | ||
+ | the device and prevents unauthorized users from accessing the system. | ||
+ | Below example helps in validating remote access acl is configured using NetYCE Compliance module. | ||
+ | |||
+ | ===Example config=== | ||
+ | |||
+ | campus01-b02-access01 and campus01-b02-access02 are the two reference devices which we are using for this example. | ||
+ | |||
+ | Below command output gives us the information. | ||
+ | |||
+ | ==campus01-b02-access01# | ||
+ | |||
+ | {{: | ||
+ | |||
+ | ==campus01-b02-access02# | ||
+ | |||
+ | {{: | ||
+ | |||
+ | ===How its done=== | ||
+ | Below are the steps to create new policy. | ||
+ | //Operate -> Compliance -> Policies -> New->// | ||
+ | {{: | ||
+ | |||
+ | Click on the Node Group to select the relevant group of devices to add: | ||
+ | {{: | ||
+ | |||
+ | //Rule -> New// | ||
+ | |||
+ | {{: | ||
+ | {{: | ||
+ | |||
+ | ===Report/ | ||
+ | |||
+ | //Operate -> Compliance -> Reports -> New -> Report Name “test” -> Report type “Policies” -> Policy Name “Sample1 : Verify ACL for remote access” -> Show Report// | ||
+ | |||
+ | {{: | ||
+ | |||
+ | |||
+ | This was a simple example to understand how to implement compliance policy to verify vty acl configuration. | ||
+ | |||