I want to establish a setup at a customer location with enhanced security features, especially Layer2 access lists.
I hoped it would be possible to define access groups with specific ACLs to only allow known MAC addresses access to the network.
Applying these groups to VLANs doesn't seem possible because, if I'm not mistaken, these could only be applied to physical interfaces but this limitation seems acceptable as we are not going to use VMPS and have to configure VLAN changes manually, so we can also change the access group membership manually.
Using 802.1x is not (yet) desirable.
I was hardly looking to find some details according limits, as for example maximum number of access groups, layer2 acls or other limitations which might interfere with my desired setup.
There will be one access group per vlan and each port will get an access group assigned to prevent "untrusted" access to the network (in fact, trusting on mac addresses is not very secure either but nevertheless it's better than nothing)
One known limitation on layer3 (!) ACLs is the subnet mask which has to be the same for all ACLs on a single physical interface but this is not of interest for the described setup.
Perhaps someone has tried something similar and wants to tell about his/her experiences.
I'm working on a project that includes basic router configurations. I configurated everything including: line console 0, line vty 0 15 and secret passwords. There are 3 routers in the network and every LAN is going t...
Desire to create Terminal Server ("TS" in this document) out of 2811 Cisco Router with HWIC-16A card (with Octal cables)
Desire to use SSH over Telnet
TS is ip'ed, SSH access configured (to the TS)
Python based Script to BULK Import/Delete devices using Cisco Prime API
Check my Repo on GitHub for all the details ( see below link )