<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic First point, you don't have in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-packet-tracer-question/m-p/2666230#M195282</link>
    <description>&lt;P&gt;First point, you don't have an access list on vlan 10 and 20. So therefore all traffic&amp;nbsp;will be allowed through on those vlans. You have applied to your access list to sub interface 30, meaning sub interface 10 and 20 traffic is not inspected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for vlan 30, access-list looks a bit jumbled but it should work. This is what i would do:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list 100&amp;nbsp;permit ip&amp;nbsp;192.168.0.0 0.0.0.31 host 192.168.10.2 log&lt;/P&gt;&lt;P&gt;access-list 100 deny ip any any log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remember there is an implicit deny any at the bottom so any deny at the bottom is not needed, but in this case I have put it there with log keyword, so after you try your traffic do show access-list 100. and see what line has hit count increasing, that will indicate which rule the traffic is matching.&lt;/P&gt;</description>
    <pubDate>Wed, 08 Apr 2015 01:49:53 GMT</pubDate>
    <dc:creator>ryancisco01</dc:creator>
    <dc:date>2015-04-08T01:49:53Z</dc:date>
    <item>
      <title>ACL Packet Tracer Question</title>
      <link>https://community.cisco.com/t5/network-security/acl-packet-tracer-question/m-p/2666229#M195281</link>
      <description>&lt;P&gt;Currently practicing configuring ACLS on packet tracer and I am having trouble doing so. My scenario is that i have 3 vlans&amp;nbsp; VLAN 10 sales Vlan 20 management Vlan 30 admin. I want to only permit vlan 30 to only have the access to the server and to deny vlan 10 and 20 access.&lt;/P&gt;&lt;P&gt;access-list 100 access-list 100 permit ip 192.168.0.0 0.0.0.31 192.168.10.2 0.0.0.0&lt;/P&gt;&lt;P&gt;access-list 100 access-list 100 deny ip any192.168.10.2 0.0.0.0&lt;/P&gt;&lt;P&gt;int fa0/0.30&lt;/P&gt;&lt;P&gt;ip access-group 100 in&lt;/P&gt;&lt;P&gt;When i do this it denies vlan 30 from pinging anything and vlan 10 and 20 can still ping radius server.&lt;/P&gt;&lt;P&gt;Hope anyone can help. Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" src="http://i.imgur.com/sj8lhad.png?1" style="width: 1108px; height: 447px;" /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:44:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-packet-tracer-question/m-p/2666229#M195281</guid>
      <dc:creator>oneofthose</dc:creator>
      <dc:date>2019-03-12T05:44:39Z</dc:date>
    </item>
    <item>
      <title>First point, you don't have</title>
      <link>https://community.cisco.com/t5/network-security/acl-packet-tracer-question/m-p/2666230#M195282</link>
      <description>&lt;P&gt;First point, you don't have an access list on vlan 10 and 20. So therefore all traffic&amp;nbsp;will be allowed through on those vlans. You have applied to your access list to sub interface 30, meaning sub interface 10 and 20 traffic is not inspected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for vlan 30, access-list looks a bit jumbled but it should work. This is what i would do:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list 100&amp;nbsp;permit ip&amp;nbsp;192.168.0.0 0.0.0.31 host 192.168.10.2 log&lt;/P&gt;&lt;P&gt;access-list 100 deny ip any any log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remember there is an implicit deny any at the bottom so any deny at the bottom is not needed, but in this case I have put it there with log keyword, so after you try your traffic do show access-list 100. and see what line has hit count increasing, that will indicate which rule the traffic is matching.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2015 01:49:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-packet-tracer-question/m-p/2666230#M195282</guid>
      <dc:creator>ryancisco01</dc:creator>
      <dc:date>2015-04-08T01:49:53Z</dc:date>
    </item>
  </channel>
</rss>

