cisco help

Posted on 2006-11-01
Last Modified: 2010-04-10
what enterface do you set to enable passord protection on telnet sessions?
Question by:zenworksb

Accepted Solution

renill earned 500 total points
ID: 17855962
its the virtual interface.

#line vty 0 4
#password <password?

Thats It..

LVL 10

Expert Comment

ID: 17855984
do below steps

config terminal

line vty 0 4

password  <password for telnet>


Expert Comment

ID: 17856275
srgilani, you forgot to add in another "login" statement after the "line vty 0 4" statement. By adding this "login" statement, the router/switch should able to prompt for password when you telnet.

If you want to add the username and password togather for login, you should add another statement username xxx password xxxx.

LVL 11

Expert Comment

ID: 17863965
a complete protection would be to also add a access-list so that telnet access is allowed from specific IPs only.

(config)# access-list 50 remark Protect telnet access
(config)# access-list 50 permit host <ip addr>
(config)# line vty 0 4
(config-line)# password <password>
(config-line)# login
(config-line)# access-class 50 in

or, instead of specifying a host, you can specify a range of ips:

(config)# access-list 50 remark Protect telnet access
(config)# access-list 50 permit <ipAddr> <wildcardMask>

Note that wildcardMask is not the same as subnet mask. Here is how to get it
Say for example that the subnet mask is

256 - 240 = 16
16 - 1 = 15
Replace all 255 with 0

The wildcard mask is


Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Confused about VPN connection and private IP addresses..?? 5 59
logging buffered 8 46
What Can't I Connect by FTP??? 27 95
Network access 4 37
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Internet Business Fax to Email Made Easy - With  eFax Corporate (, you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now