I would be very cautious with that access list. Every access list ends with an implicit deny any any. So if you do not have some statements that permit some traffic you will find that nothing goes through the router interface. Also be aware that if you attempt to protect access to the router with access lists on interfaces that it can get pretty complex. To the extent that the router has multiple interfaces, you will need to specify each of these interfaces in the access list. Also if you deny ip any with your router
interfaces as destination you will also prevent any ping from working, or any traceroute from the router, or lots of other things that you may need.
I believe that you should start by carefully evaluating what your requirements really are. If you want to prevent any remote access, the simple solution is to configure this:
line vty 0 4
This will prevent ANY remote access to the router.
But that may be more severe than you really want. If you want some remote access from inside addresses and not from outside I suggest that your primary approach should be to configure access-class on the vty ports. access-class uses standard access lists to define who can access the router remotely. It is a much better approach than attempting to create access lists on interfaces. It would look somewhat like this:
BenefitsDocumentationPrerequisiteImage Download LinksLimitationsSupported PlatformsLicense RequirementsTopologyStep-By-Step ConfigurationConfigure Virtual ServiceActivate the virtual service and configure guest IPsConfiguring UTD (Service Plane)Configurin...
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...