Thanks for the response. I thought ACL's where only applied to traffic coming in or out of a port. In my scenario all traffic passes interally over port 13 of the switch so ACL's would not be applicable. I may be wrong but I'm pretty sure I read this a couple of days ago when I started researching the solution.
Thanks again for the response. I'm about to finish for the day but I will read through the document tonight and attempt to apply the ACL's in the morning. I'll report back and let you know either way.
Moonigan
14 Posts
0
May 17th, 2012 09:00
Hi,
Thanks for the response. I thought ACL's where only applied to traffic coming in or out of a port. In my scenario all traffic passes interally over port 13 of the switch so ACL's would not be applicable. I may be wrong but I'm pretty sure I read this a couple of days ago when I started researching the solution.
Regards
Paul
Moonigan
14 Posts
0
May 17th, 2012 12:00
Thanks again for the response. I'm about to finish for the day but I will read through the document tonight and attempt to apply the ACL's in the morning. I'll report back and let you know either way.
Regards
Paul
Moonigan
14 Posts
0
May 18th, 2012 02:00
As promised I have setup an ACL with a few ACE's and it works perfectly so thankyou very much for your assistance. :emotion-21:
For completeness here are the commands I added to get the ACL working.
ACCESS-LIST INFRA permit IP ANY 172.16.1.0 0.0.0.255 (Allow all networks to talk to the INFRASTRUCTURE LAN)
ACCESS-LIST INFRA permit IP 172.16.1.0 0.0.0.255 (Allow the INFRASTRUCTURE LAN to talk to anything)
ACCESS-LIST INFRA deny ANY ANY (dont allow anything to talk to anything else)
Once I had created the ACL I used the following to apply it to the VLANs 162 and 163
INTERFACE VLAN 162
IP ACCESS-GROUP INFRA
Rinse and repeat the two commands above for each VLAN
Thanks again
Paul