Contents

ACL Authentication of Incoming rsh and rcp Requests

Feature History

Release

Modification

12.2(8)T

This feature was introduced.

This document describes the ACL Authentication of Incoming RSH and RCP Requests feature in Cisco IOS Release 12.2(8)T. It includes the following sections:

Feature Overview

To enable the Cisco IOS software to receive incoming remote shell (rsh) protocol and remote copy (rcp) protocol requests, customers must configure an authentication database to control access to the router. This configuration is accomplished by using the iprcmdremote-hostcommand.

Currently, when using this command, customers must specify the local user, the remote host, and the remote user in the database authentication configuration. For users who can execute commands to the router from multiple hosts, multiple database authentication configuration entries must be used, one for each host, as shown below.

ip rcmd remote-host local-user1 remote-host1 remote-user1
ip rcmd remote-host local-user1 remote-host2 remote-user1
ip rcmd remote-host local-user1 remote-host3 remote-user1
ip rcmd remote-host local-user1 remote-host4 remote-user1

This feature allows customers to specify an access list for a given user. The access list identifies the hosts to which the user has access. A new argument, access-list , has been added that can be used with this command to specify the access list, as shown below.

ip rcmd remote-host local-user1 access-list remote-user1

To allow a user access to the hosts identified in the access list, first define the access list. If the access list is not already defined, access to the host will be denied. For information about defining an access list, refer to the Cisco IOS Security Configuration Guide , Release 12.2.

For more information about using the modified iprcmdremote-host command, see the “Command Reference” section later in this document.

Related Documents

  • Cisco IOS Configuration Fundamentals Command Reference, Release 12.2

  • Cisco IOS Security Configuration Guide , Release 12.2

  • Cisco IOS Security Command Reference, Release 12.2

Supported Platforms

  • Cisco 805

  • Cisco 806

  • Cisco 828

  • Cisco 1400 series

  • Cisco 1600 series

  • Cisco 1710

  • Cisco 1720

  • Cisco 1721

  • Cisco 1750

  • Cisco 1751

  • Cisco 2420

  • Cisco 3620

  • Cisco 3631

  • Cisco 3640

  • Cisco 3660

  • Cisco 3725

  • Cisco 3745

  • Cisco 2500 series

  • Cisco 2600 series

  • Cisco 7100 series

  • Cisco 7200 series

  • Cisco 7500 series

  • Cisco uBR7200 series

  • Cisco Voice Gateway 200

  • URM (Universal Route Module)

Determining Platform Support Through Cisco Feature Navigator

Cisco IOS software is packaged in feature sets that support specific platforms. To get updated information regarding platform support for this feature, access Cisco Feature Navigator. Cisco Feature Navigator dynamically updates the list of supported platforms as new platform support is added for the feature.

Cisco Feature Navigator is updated regularly when major Cisco IOS software releases and technology releases occur. For the most current information, go to the Cisco Feature Navigator home page at the following URL:

http:/​/​www.cisco.com/​go/​fn


ACL Authentication of Incoming rsh and rcp Requests

ACL Authentication of Incoming rsh and rcp Requests

Feature History

Release

Modification

12.2(8)T

This feature was introduced.

This document describes the ACL Authentication of Incoming RSH and RCP Requests feature in Cisco IOS Release 12.2(8)T. It includes the following sections:

Feature Overview

To enable the Cisco IOS software to receive incoming remote shell (rsh) protocol and remote copy (rcp) protocol requests, customers must configure an authentication database to control access to the router. This configuration is accomplished by using the iprcmdremote-hostcommand.

Currently, when using this command, customers must specify the local user, the remote host, and the remote user in the database authentication configuration. For users who can execute commands to the router from multiple hosts, multiple database authentication configuration entries must be used, one for each host, as shown below.

ip rcmd remote-host local-user1 remote-host1 remote-user1
ip rcmd remote-host local-user1 remote-host2 remote-user1
ip rcmd remote-host local-user1 remote-host3 remote-user1
ip rcmd remote-host local-user1 remote-host4 remote-user1

This feature allows customers to specify an access list for a given user. The access list identifies the hosts to which the user has access. A new argument, access-list , has been added that can be used with this command to specify the access list, as shown below.

ip rcmd remote-host local-user1 access-list remote-user1

To allow a user access to the hosts identified in the access list, first define the access list. If the access list is not already defined, access to the host will be denied. For information about defining an access list, refer to the Cisco IOS Security Configuration Guide , Release 12.2.

For more information about using the modified iprcmdremote-host command, see the “Command Reference” section later in this document.

Related Documents

  • Cisco IOS Configuration Fundamentals Command Reference, Release 12.2

  • Cisco IOS Security Configuration Guide , Release 12.2

  • Cisco IOS Security Command Reference, Release 12.2

Supported Platforms

  • Cisco 805

  • Cisco 806

  • Cisco 828

  • Cisco 1400 series

  • Cisco 1600 series

  • Cisco 1710

  • Cisco 1720

  • Cisco 1721

  • Cisco 1750

  • Cisco 1751

  • Cisco 2420

  • Cisco 3620

  • Cisco 3631

  • Cisco 3640

  • Cisco 3660

  • Cisco 3725

  • Cisco 3745

  • Cisco 2500 series

  • Cisco 2600 series

  • Cisco 7100 series

  • Cisco 7200 series

  • Cisco 7500 series

  • Cisco uBR7200 series

  • Cisco Voice Gateway 200

  • URM (Universal Route Module)

Determining Platform Support Through Cisco Feature Navigator

Cisco IOS software is packaged in feature sets that support specific platforms. To get updated information regarding platform support for this feature, access Cisco Feature Navigator. Cisco Feature Navigator dynamically updates the list of supported platforms as new platform support is added for the feature.

Cisco Feature Navigator is updated regularly when major Cisco IOS software releases and technology releases occur. For the most current information, go to the Cisco Feature Navigator home page at the following URL:

http:/​/​www.cisco.com/​go/​fn