?
Solved

Router

Posted on 2004-04-28
4
Medium Priority
?
1,371 Views
Last Modified: 2013-11-29
HI

 I HAVE A CISCO 1721 ROUTER. NO CONFIGURATION IS DONE IN THE ROUTHER..BUT WHEN I GAVE COMMAND.. "SHOW EXTENDED   IP ACCESS LIST" I M GETTING RESULT LIKE

Router#sh ip access-lists
Extended IP access list sl_def_acl
    10 deny tcp any any eq telnet log
    20 deny tcp any any eq www log
    30 deny tcp any any eq 22 log
    40 permit ip any any log


WHT IS THIS ACCESSLIST.. IS IT SOMETHING DEFAULT.. I DIDNOT DO ANY CONFIGURATION. EVEN I CANT DELETE THIS  ACCESS LIST

REGS
0
Comment
Question by:pvraj
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 37

Expert Comment

by:meverest
ID: 10946167
it's a cisco default acl to prevent remote access *to* the router (as different than *through*).  i think it is normally applied to the internet interface to stop access to it from outside the protected network.

bit if it's not applied to any interface, then it's not relevant anyway.

cheers.
0
 
LVL 1

Expert Comment

by:Mike_helps_you
ID: 10946215
It's the default interface acl from cisco, as meverest said.  REMINDER, to update the patch for cisco's recent vulnerability.  IT's VERY IMPORTANT>
0
 

Author Comment

by:pvraj
ID: 10946556
"REMINDER, to update the patch for cisco's recent vulnerability.  IT's VERY IMPORTANT"

I m really new in this cisco field.. Could you pls tell me abt which update u r talking abt


regs
pvraj
0
 
LVL 2

Accepted Solution

by:
dungsusu earned 200 total points
ID: 10960908
There are some security configuration options as default in the router to be set up like FTP, Telnet, HTTP etc. If you choose among options to block those services, it means you choose more security status for your system. So that IP address showed as you mentioned depending on what kind of port you select off/on.

regards
dungsusu
0

Featured Post

Ransomware Attacks Keeping You Up at Night?

Will your organization be ransomware's next victim?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with our Ransomware Prevention Kit!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Suggested Courses
Course of the Month8 days, 12 hours left to enroll

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question