======Verify that remote access acl is configured ====== Configuring VTY access control restricts remote access to only those authorized to manage the device and prevents unauthorized users from accessing the system. Below example helps in validating remote access acl is configured using NetYCE Compliance module. ===Example config=== campus01-b02-access01 and campus01-b02-access02 are the two reference devices which we are using for this example. One has vty acl configuration and other does not. Below command output gives us the information. ==campus01-b02-access01#== {{:guides:user:compliance:compliance:howto:cpl1_2.png}} ==campus01-b02-access02#== {{:guides:user:compliance:compliance:howto:cpl1_3.png}} ===How its done=== Below are the steps to create new policy. //Operate -> Compliance -> Policies -> New->// {{:guides:user:compliance:compliance:howto:cpl1_1.png}} Click on the Node Group to select the relevant group of devices to add: {{:guides:user:compliance:compliance:howto:cpl1_4.png}} //Rule -> New// {{:guides:user:compliance:compliance:howto:cpl1_5.png}} {{:guides:user:compliance:compliance:howto:cpl1_6.png}} ===Report/test results:=== //Operate -> Compliance -> Reports -> New -> Report Name “test” -> Report type “Policies” -> Policy Name “Sample1 : Verify ACL for remote access” -> Show Report// {{:guides:user:compliance:compliance:howto:cpl1_7.png}} This was a simple example to understand how to implement compliance policy to verify vty acl configuration.