nanog mailing list archives

Re: Proper authentication model


From: Stephen Stuart <stuart () tech org>
Date: Wed, 12 Jan 2005 08:05:57 -0800


When crafting the ACL that restricts what source IP{,v6} addresses may
ssh to the router, you may want to include each router's neighbors by
both their loopback and any interface addresses that might source a
packet (if your security policy permits it). 

I forgot a phrase: [that might source a packet] headed for another
router.

Stephen


Current thread: