hardmultiple choiceObjective-mapped

A router allows SSH management from anywhere on the internal network. A new policy requires that only the management subnet 10.50.50.0/24 be allowed to initiate SSH to the device. Which approach best enforces that requirement?

Question 1hardmultiple choice
Full question →

A router allows SSH management from anywhere on the internal network. A new policy requires that only the management subnet 10.50.50.0/24 be allowed to initiate SSH to the device. Which approach best enforces that requirement?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Restrict SSH access so only the 10.50.50.0/24 management subnet is permitted

This is correct because the policy is specifically about limiting management access by source.

B

Distractor review

Replace SSH with Telnet so the traffic is easier to identify

This is wrong because Telnet is less secure than SSH.

C

Distractor review

Enable PortFast on all access switches

This is wrong because PortFast is unrelated to router management access control.

D

Distractor review

Raise the Syslog severity threshold

This is wrong because logging thresholds do not restrict who can initiate SSH.

Common exam trap

Common exam trap: answer the scenario, not the keyword

A frequent exam trap is selecting an option that changes the management protocol, such as replacing SSH with Telnet, because it seems to simplify access control. However, Telnet is insecure as it transmits data in clear text, exposing credentials to interception. Another trap is choosing unrelated features like PortFast or syslog severity thresholds, which do not control access to management services. Candidates may also overlook the need to apply an ACL to restrict source IPs, mistakenly believing that enabling SSH alone enforces the policy. This misunderstanding leads to incomplete security configurations that fail the requirement to limit SSH access to the management subnet.

Technical deep dive

How to think about this question

Access Control Lists (ACLs) are fundamental tools in Cisco networking used to control traffic flow by filtering packets based on criteria such as source IP addresses, destination IP addresses, and protocols. In the context of router management, ACLs can be applied to restrict which hosts or subnets are allowed to initiate management sessions like SSH. SSH (Secure Shell) is the industry-standard protocol for secure remote management because it encrypts all communication, including authentication credentials, ensuring confidentiality and integrity. To enforce a policy that only the management subnet 10.50.50.0/24 can initiate SSH connections, an ACL is created permitting SSH traffic only from that subnet and denying all other sources. This ACL is then applied to the router’s VTY (virtual terminal) lines or inbound interface to filter incoming SSH connection attempts. This approach ensures that even if SSH is enabled globally, only trusted hosts within the management subnet can establish sessions, effectively reducing the attack surface and improving security. A common exam trap is confusing protocol choice with access control. While SSH is the correct secure protocol, simply enabling SSH does not restrict who can connect. Another trap is assuming unrelated features like PortFast or syslog severity thresholds affect access control; they do not. PortFast optimizes Spanning Tree convergence and syslog controls logging detail, neither restricts SSH access. Understanding the distinction between protocol security and access control mechanisms is critical for correctly implementing and securing device management in Cisco environments.

KKey Concepts to Remember

  • Access Control Lists (ACLs) are used on Cisco routers to filter traffic based on source IP addresses, destination IP addresses, protocols, and ports.
  • SSH is the preferred secure management protocol for Cisco devices because it encrypts all transmitted data, preventing interception and tampering.
  • Applying an ACL to the VTY lines or inbound interface restricts which source IP addresses can initiate SSH sessions to the router.
  • A management subnet like 10.50.50.0/24 is commonly designated to centralize and secure device administration traffic.
  • Restricting SSH access by source subnet reduces the attack surface by allowing only trusted hosts to connect to the router’s management interface.
  • Replacing SSH with Telnet is insecure because Telnet transmits credentials and data in clear text, exposing the device to interception.
  • PortFast is a Spanning Tree Protocol feature that speeds up port transition to forwarding state and does not control access to router management.
  • Syslog severity thresholds control logging verbosity but do not affect network access or restrict SSH session initiation.

TExam Day Tips

  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Related practice questions

Related 200-301 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this 200-301 question test?

Access Control Lists (ACLs) are used on Cisco routers to filter traffic based on source IP addresses, destination IP addresses, protocols, and ports.

What is the correct answer to this question?

The correct answer is: Restrict SSH access so only the 10.50.50.0/24 management subnet is permitted — The best approach is to use an access control mechanism that limits SSH access to the approved source subnet. In practical terms, SSH is the correct secure protocol, but protocol choice alone is not enough. The device should also restrict who is allowed to reach that management service. That usually means applying an ACL or equivalent source restriction focused on the management subnet. This is a common management-plane security pattern: use a secure protocol, then limit the set of trusted sources that are allowed to use it.

What should I do if I get this 200-301 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.