Management | 65
Terminal Lines
You can access the system remotely and restrict access to the system by creating user profiles. The terminal
lines on the system provide different means of accessing the system. The console line (console) connects
you through the Console port in the RPMs. The virtual terminal lines (VTY) connect you through Telnet to
the system. The auxiliary line (aux) connects secondary devices such as modems.
Deny and Permit Access to a Terminal Line
Dell Force10 recommends applying only standard ACLs to deny and permit access to VTY lines.
• Layer 3 ACL deny all traffic that is not explicitly permitted, but in the case of VTY lines, an ACL with
no rules does not deny any traffic.
• You cannot use
show ip accounting access-list to display the contents of an ACL that is applied only to a
VTY line.
To apply an IP ACL to a line:
To view the configuration, enter the
show config command in the LINE mode, as shown in the example
below.
FTOS(config-std-nacl)#show config
!
ip access-list standard myvtyacl
seq 5 permit host 10.11.0.1
FTOS(config-std-nacl)#line vty 0
FTOS(config-line-vty)#show config
line vty 0
access-class myvtyacl
Configure Login Authentication for Terminal Lines
You can use any combination of up to 6 authentication methods to authenticate a user on a terminal line. A
combination of authentication methods is called a method list. If the user fails the first authentication
method, FTOS prompts the next method until all methods are exhausted, at which point the connection is
terminated. The available authentication methods are:
Task Command Syntax Command Mode
Apply an ACL to a VTY line. ip access-class access-list LINE
FTOS Behavior: Prior to FTOS version 7.4.2.0, in order to deny access on a VTY line, you must apply an ACL and
AAA authentication to the line. Then users are denied access only after they enter a username and password.
Beginning in FTOS version 7.4.2.0, only an ACL is required, and users are denied access before they are
prompted for a username and password.