<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-with-acl/m-p/3028483#M135430</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I had a quick look at your design.&lt;/P&gt;
&lt;P&gt;First of all, as your distribution switches will act as default gateway, you don't need to setup an IP for all vlans on each 2960 access switches. You can remove those SVI for vlans 20,30 and 40.&lt;/P&gt;
&lt;P&gt;You can just keep vlan 1 as management vlan. Be careful on the default-gateway you configure on access switches. It should the HSRP VIP ip of your vlan 1. Those switches will act as Layer 2 that means there aren't gonna do any routing.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;On your distribution switches, the hsrp config has to be the same on both switches. Only the priority will change.&lt;/P&gt;
&lt;P&gt;This is your config:&lt;/P&gt;
&lt;P&gt;### DISTRIBUTION 2 ###&lt;/P&gt;
&lt;P&gt;interface Vlan40&lt;BR /&gt; description Sales&lt;BR /&gt; mac-address 00e0.a39d.cd04&lt;BR /&gt; ip address 192.168.40.2 255.255.255.0&lt;BR /&gt; standby 0 ip 192.168.40.101&lt;BR /&gt; standby 0 preempt&lt;/P&gt;
&lt;P&gt;### DISTRIBUTION 1 ###&lt;/P&gt;
&lt;P&gt;interface Vlan40&lt;BR /&gt; description Sales&lt;BR /&gt; mac-address 00d0.583a.1204&lt;BR /&gt; ip address 192.168.40.6 255.255.255.0&lt;BR /&gt; standby 40 ip 192.168.40.100&lt;BR /&gt; standby 40 priority 150&lt;BR /&gt; standby 0 preempt&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The config should be:&lt;/P&gt;
&lt;P&gt;### DISTRIBUTION 2 ###&lt;/P&gt;
&lt;P&gt;interface Vlan40&lt;BR /&gt; description Sales&lt;BR /&gt; mac-address 00e0.a39d.cd04&lt;BR /&gt; ip address 192.168.40.2 255.255.255.0&lt;BR /&gt; standby 40 ip 192.168.40.100&lt;BR /&gt; standby 40 preempt&lt;/P&gt;
&lt;P&gt;### DISTRIBUTION 1 ###&lt;/P&gt;
&lt;P&gt;interface Vlan40&lt;BR /&gt; description Sales&lt;BR /&gt; mac-address 00d0.583a.1204&lt;BR /&gt; ip address 192.168.40.6 255.255.255.0&lt;BR /&gt; standby 40 ip 192.168.40.100&lt;BR /&gt; standby 40 priority 150&lt;BR /&gt; standby 400 preempt&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In terms on access-list, I will write down the acl to allow only host 192.168.40.22 to access http, deny all others accessing this server in http and allowing every other protocols. This acl will be applied on your router called Border Router on interface G0/0:&lt;/P&gt;
&lt;P&gt;ip access-list extended 190&lt;/P&gt;
&lt;P&gt;&amp;nbsp;1 permit tcp host 10.0.0.18 eq 80 host 192.168.40.22&lt;/P&gt;
&lt;P&gt;&amp;nbsp;2 deny tcp host 10.0.0.18 eq 80 any&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;3 permit ip any any&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface g0/0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip access-group 190 in&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope that answers your questions.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this answered your questions.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 19 May 2017 21:39:42 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2017-05-19T21:39:42Z</dc:date>
    <item>
      <title>PROBLEM WITH ACL</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-acl/m-p/3028482#M135426</link>
      <description>&lt;P&gt;Hi everyone&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I study CCNA and have network created in Packet tracer with 4 vlans. I want to restrict some of the specific hosts from www:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;VLAN 20 hosts 192.168.20.22 and 192.168.20.23&lt;/LI&gt;
&lt;LI&gt;VLAN 30 hosts 192.168.30.22 and 192.168.30.23&lt;/LI&gt;
&lt;LI&gt;VLAN 40 hosts 192.168.40.22 and 192.168.30.23&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I set WEB server in outside network but also not sure if settings are OK. I want to block those hosts from any www traffic&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm not sure which interface and what access list (standard/extended) to apply with that topology and &amp;nbsp;NAT&lt;/P&gt;
&lt;P&gt;Because it will be very difficult to explain whole case&amp;nbsp;and all the IP addresses, I attached .pkt file&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any help will be much appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Kind Regards Peter Majchrzak &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:23:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-acl/m-p/3028482#M135426</guid>
      <dc:creator>enginerster</dc:creator>
      <dc:date>2019-03-12T09:23:19Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-acl/m-p/3028483#M135430</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I had a quick look at your design.&lt;/P&gt;
&lt;P&gt;First of all, as your distribution switches will act as default gateway, you don't need to setup an IP for all vlans on each 2960 access switches. You can remove those SVI for vlans 20,30 and 40.&lt;/P&gt;
&lt;P&gt;You can just keep vlan 1 as management vlan. Be careful on the default-gateway you configure on access switches. It should the HSRP VIP ip of your vlan 1. Those switches will act as Layer 2 that means there aren't gonna do any routing.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;On your distribution switches, the hsrp config has to be the same on both switches. Only the priority will change.&lt;/P&gt;
&lt;P&gt;This is your config:&lt;/P&gt;
&lt;P&gt;### DISTRIBUTION 2 ###&lt;/P&gt;
&lt;P&gt;interface Vlan40&lt;BR /&gt; description Sales&lt;BR /&gt; mac-address 00e0.a39d.cd04&lt;BR /&gt; ip address 192.168.40.2 255.255.255.0&lt;BR /&gt; standby 0 ip 192.168.40.101&lt;BR /&gt; standby 0 preempt&lt;/P&gt;
&lt;P&gt;### DISTRIBUTION 1 ###&lt;/P&gt;
&lt;P&gt;interface Vlan40&lt;BR /&gt; description Sales&lt;BR /&gt; mac-address 00d0.583a.1204&lt;BR /&gt; ip address 192.168.40.6 255.255.255.0&lt;BR /&gt; standby 40 ip 192.168.40.100&lt;BR /&gt; standby 40 priority 150&lt;BR /&gt; standby 0 preempt&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The config should be:&lt;/P&gt;
&lt;P&gt;### DISTRIBUTION 2 ###&lt;/P&gt;
&lt;P&gt;interface Vlan40&lt;BR /&gt; description Sales&lt;BR /&gt; mac-address 00e0.a39d.cd04&lt;BR /&gt; ip address 192.168.40.2 255.255.255.0&lt;BR /&gt; standby 40 ip 192.168.40.100&lt;BR /&gt; standby 40 preempt&lt;/P&gt;
&lt;P&gt;### DISTRIBUTION 1 ###&lt;/P&gt;
&lt;P&gt;interface Vlan40&lt;BR /&gt; description Sales&lt;BR /&gt; mac-address 00d0.583a.1204&lt;BR /&gt; ip address 192.168.40.6 255.255.255.0&lt;BR /&gt; standby 40 ip 192.168.40.100&lt;BR /&gt; standby 40 priority 150&lt;BR /&gt; standby 400 preempt&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In terms on access-list, I will write down the acl to allow only host 192.168.40.22 to access http, deny all others accessing this server in http and allowing every other protocols. This acl will be applied on your router called Border Router on interface G0/0:&lt;/P&gt;
&lt;P&gt;ip access-list extended 190&lt;/P&gt;
&lt;P&gt;&amp;nbsp;1 permit tcp host 10.0.0.18 eq 80 host 192.168.40.22&lt;/P&gt;
&lt;P&gt;&amp;nbsp;2 deny tcp host 10.0.0.18 eq 80 any&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;3 permit ip any any&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface g0/0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip access-group 190 in&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope that answers your questions.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this answered your questions.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2017 21:39:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-acl/m-p/3028483#M135430</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-05-19T21:39:42Z</dc:date>
    </item>
    <item>
      <title>Thank you Francesco Molino</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-acl/m-p/3028484#M135432</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/supportlan" title="View user profile." class="username" lang="" about="/users/supportlan" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;Francesco Molino&lt;/A&gt;&amp;nbsp;for your answer, yes it did answer my question. Thanks for your help looks much more clear now.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards Peter Majchrzak&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 May 2017 12:25:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-acl/m-p/3028484#M135432</guid>
      <dc:creator>enginerster</dc:creator>
      <dc:date>2017-05-20T12:25:03Z</dc:date>
    </item>
    <item>
      <title>You're welcome. </title>
      <link>https://community.cisco.com/t5/network-security/problem-with-acl/m-p/3028485#M135434</link>
      <description>&lt;P&gt;You're welcome.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you mark please my answer as correct answer?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 20 May 2017 12:55:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-acl/m-p/3028485#M135434</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-05-20T12:55:51Z</dc:date>
    </item>
  </channel>
</rss>

