I want to establish a setup at a customer location with enhanced security features, especially Layer2 access lists.
I hoped it would be possible to define access groups with specific ACLs to only allow known MAC addresses access to the network.
Applying these groups to VLANs doesn't seem possible because, if I'm not mistaken, these could only be applied to physical interfaces but this limitation seems acceptable as we are not going to use VMPS and have to configure VLAN changes manually, so we can also change the access group membership manually.
Using 802.1x is not (yet) desirable.
I was hardly looking to find some details according limits, as for example maximum number of access groups, layer2 acls or other limitations which might interfere with my desired setup.
There will be one access group per vlan and each port will get an access group assigned to prevent "untrusted" access to the network (in fact, trusting on mac addresses is not very secure either but nevertheless it's better than nothing)
One known limitation on layer3 (!) ACLs is the subnet mask which has to be the same for all ACLs on a single physical interface but this is not of interest for the described setup.
Perhaps someone has tried something similar and wants to tell about his/her experiences.
Hi everyone, I would like to thank you in advance for any help you can provide a newcomer like myself!
Im studying the 100-105 book by Odom and am currently on the topic of Port security. I purchased a used 2960 and I'm trying to follow a...
While deploying a number of 18xx/2802/3802 model access points (APs), which run AP-COS as their operating platform. It can be observed on some occasions that while many of their access points were able to join the fabric WLC withou...
I am going to design and build an LAN network under a tunnel underground with long distance between the switches.
I will have 2 Catalyst switches and 8 Industrial IE3000, and they will be connected with fiber.
For now I am planning on use Layer-2 s...