11-05-2019 07:07 AM - edited 02-21-2020 11:11 AM
Hi Cisco Community! I have a silly question.
I'm looking to configure an ACL to allow 10.0.1.43 to ONLY be able to communicate with 10.0.254.52 via any protocol but no other machines or internet. The machines are part of the same broadcoast domain but they do reside on different switches. I believe I need to configure the extended ACL at the switch where 10.0.1.43 resides as that is the originating traffic and the machine I'm attempting to isolate to one other machine for communication.
10.0.1.43 is connected to Switch-A.. on port 1/42.. 10.0.254.52 is connected to switch-B.. The gateway for the LAN(10.0.0.1/16) is an inside interface of a Sonicwall Firewall but the switches have SVI's for the broadcoast domain.
Any assistance with CLI syntax would be greatly appreciated!
TY
Solved! Go to Solution.
11-05-2019 01:01 PM
If your switch act as L2 Switch and all the Device /16 subnet is routed to your FW - they are a single broadcast domain in this case, they contact each other directly.
I believe you should look for MAC ACL - 10.0.1.43 to 10.0.254.52 - for the internet you can block on your SonicWall for the IP, not to dom translation or deny.
here is good example :
https://blog.ine.com/an-introduction-to-mac-access-lists
11-05-2019 01:01 PM
If your switch act as L2 Switch and all the Device /16 subnet is routed to your FW - they are a single broadcast domain in this case, they contact each other directly.
I believe you should look for MAC ACL - 10.0.1.43 to 10.0.254.52 - for the internet you can block on your SonicWall for the IP, not to dom translation or deny.
here is good example :
https://blog.ine.com/an-introduction-to-mac-access-lists
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide