North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Proper authentication model

  • From: Stephen Stuart
  • Date: Wed Jan 12 11:11:12 2005

> When crafting the ACL that restricts what source IP{,v6} addresses may
> ssh to the router, you may want to include each router's neighbors by
> both their loopback and any interface addresses that might source a
> packet (if your security policy permits it). 

I forgot a phrase: [that might source a packet] headed for another
router.

Stephen