nanog mailing list archives
Re: Proper authentication model
From: Stephen Stuart <stuart () tech org>
Date: Wed, 12 Jan 2005 08:05:57 -0800
When crafting the ACL that restricts what source IP{,v6} addresses may ssh to the router, you may want to include each router's neighbors by both their loopback and any interface addresses that might source a packet (if your security policy permits it).
I forgot a phrase: [that might source a packet] headed for another router. Stephen
Current thread:
- Re: Proper authentication model, (continued)
- Re: Proper authentication model Gernot W. Schmied (Jan 12)
- Re: Proper authentication model Iljitsch van Beijnum (Jan 12)
- Re: Proper authentication model David Gethings (Jan 12)
- Re: Proper authentication model Erik Haagsman (Jan 12)
- Re: Proper authentication model Daniel Golding (Jan 12)
- Re: Proper authentication model Erik Haagsman (Jan 13)
- Re: Proper authentication model Gernot W. Schmied (Jan 16)
- Re: Proper authentication model Joe Abley (Jan 11)
- Re: Proper authentication model Stephen Stuart (Jan 12)
- Re: Proper authentication model Joe Abley (Jan 12)
- RE: Proper authentication model Steve Gibbard (Jan 12)
- Re: Proper authentication model Joe Abley (Jan 12)
- Re: Proper authentication model Daniel Golding (Jan 12)
- Re: Proper authentication model Michael . Dillon (Jan 13)
- Re: Proper authentication model Owen DeLong (Jan 13)
- Re: Proper authentication model John Bittenbender (Jan 16)