revised ACL

Unanswered Question
Nov 8th, 2005
User Badges:

access-list 101 remark regulate traffic for 192.168.1.x

access-list 101 permit ip any host 192.168.1.0 0.255.255.255

access-list 101 permit ip host x.x.x.x 255.255.255.255

access-list 101 permit ip host x.x.x.x 255.255.255.255

access-list 101 permit tcp any any eq www

access-list 101 permit tcp any any eq 443

access-list 101 permit tcp any any eq smtp

access-list 101 permit tcp any any eq ftp

access-list 101 deny ip any any


access-list 102 remark regulate traffic for 192.168.2.x

access-list 102 permit ip any host 192.168.2.0 0.255.255.255

access-list 102 permit ip host x.x.x.x 255.255.255.255

access-list 102 permit ip host x.x.x.x 255.255.255.255

access-list 102 permit tcp any any eq www

access-list 102 permit tcp any any eq 443

access-list 102 permit tcp any any eq smtp

access-list 102 permit tcp any any eq ftp

access-list 102 deny ip any any


int vlan2

no ip address

access-list 101 in

access-list 101 out


int vlan3

no ipaddress

access-list 102 in

access-list 102 out



  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
Loading.
bkaren1278 Tue, 11/08/2005 - 06:27
User Badges:

ok it would probably help if i post the reason for this config..


i have 2 public vlans that i want to ensure cannot access the private vlans or each other but can access the web.


please varify this config for me.


Actions

This Discussion