I am getting confused with access-list and the access-group applying on an interface
Suppose my inside ip address x.x.x.x with subnet 255.255.255.0 and my internal web server with ip address x.x.x.x1 which should be accessed only by our remove office and their network is y.y.y.y. I create access-list like
access-list 101 permit ip y.y.y.y 255.255.255.0 host x.x.x.x1 which permit only the y subnet. That is fine. Now this access-list for the incomming request to the router serial interface.
Should the access-group command be access-group 101 in. Is this correct.
Like wise i do not want my x.x.x.x network to access z.z.z.z network i create access-list
access-list 102 deny ip x.x.x.x 255.255.255.0 z.z.z.z 255.255.255.0 . In this source is my network address and the the destination is outside and i create access group in serial interface like
access-group 102 out
Will this command work. Since some time when i give access-list and apply to any interface the communication with the router goes and i have to physically reboot the router to load in old configuration. this inbound and outbound with router's serial and ethernet interface confuses me a lot. Is there any good link for this or some one can explain me about this.
Often times complex troubleshooting issues are best addressed in an interactive session with one of our trained technical assistance engineers. While other forum users may be able to help, it's often difficult to do so for this type of issue.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...