How to Configure Security Policies to Allow Telnet
Common management protocols, such as Telnet, SSH and FTP, have similar service models. The following uses Telnet as an example. As shown in Figure 7-1, there are three types of traffic on a network:
- Inbound traffic: Telnet traffic from a management terminal to the IP address of an interface on a firewall
- Outbound traffic: Telnet traffic from a firewall to the IP address of a server
- Traffic traversing a firewall: Telnet traffic from a management terminal to the IP address of a server through a firewall
security-policy rule name "Allow inbound traffic" //Set the security policy name. Include the name that contains spaces in quotation marks. source-zone trust destination-zone local source-address 10.1.1.10 24 destination-address 10.1.1.1 24 service telnet //Specify the service for which the security policy is configured. action permit rule name "Allow outbound traffic" source-zone local destination-zone untrust source-address 10.1.2.1 24 destination-address 10.1.2.10 24 service telnet action permit rule name "Allow transmit traffic" source-zone trust destination-zone untrust source-address 10.1.1.10 24 destination-address 10.1.2.10 24 service telnet action permit
Table 7-1 describes the preceding security policies.
No. |
Name |
Source Security Zone |
Destination Security Zone |
Source Address/Region |
Destination Address/Region |
Service |
Action |
---|---|---|---|---|---|---|---|
101 |
Allow inbound traffic |
Trust |
Local |
10.1.1.10/24 |
10.1.1.1/24 |
telnet (TCP: 23) |
permit |
102 |
Allow outbound traffic |
Local |
Untrust |
10.1.2.1/24 |
10.1.2.10/24 |
telnet (TCP: 23) |
permit |
103 |
Allow transmit traffic |
Trust |
Untrust |
10.1.1.10/24 |
10.1.2.10/24 |
telnet (TCP: 23) |
permit |