I am runnning a 4506 with 12.2(20) EWA. I had configured telnet to the switch and then removed telnet by entering the "no login" command on line vty 0 4.
line vty 0 4
This will disable telnet access to the switch but it did not. I have opned a case with Cisco regarding this isue which I think is a bug. They have created the same issue and are trying to confirm that its a bug. I know you removing the vty line will give me same of affect as no login.
I would like to know if anyone experiencing the same issue and what IOS they are using.
Can't really say most network admins need to be able to telnet into the switches to manage them so generally most of us would not shut them down . If you need security you can always add acl's against the vty lines.
This is *NOT* a bug and working as designed. "no login" under VTY lines just allows telnet without prompting for a password. As you can see in the parser, it clearly says its for password checking only
cse-45b(config-line)#no login ?
local Local password checking
tacacs Use tacacs server for password checking
If you want to disable access, try configuring "no transport input" under the VTY lines.
This is actually a pretty cool feature, i didn't even know it existed until I was looking for a solution to advertise a subnet (prefix in BGP talk), only if a certain condition existed. This is exactly what conditional advertisements does
j ai une question j ai achete un routeur cisco 887VA-k9 , je le configuré avec la configuration ci- dessous
si je le lier avec mon pc portable sur l un de ses ports directement ça marche toute est bien ( la connexion internet + m...
Attached policy provides CLI access to the Cisco 4G router over text messaging. Two files are in the attached .tar file:
2. PDF with instructions on how to load and use the .tcl file.