I need assistance in creating Access Control Lists (ACL) for the following network configurations:
Site A:
- Network: 192.168.x.0 (where x = VLANs 10, 20 ,30, 40, 100 ,120 ,220)
- VLANs 10, 30, and 40:
- Should not have visibility to VLANs 20, 120, and 220 and between VLANs 10 ,30 ,40.
- Should have access to the following DMZ Servers:
- FTP Server IP: 10.66.0.3
- HTTPS-Syslog Server IP: 10.66.0.2
- Email Server IP: 10.66.0.4
- DNS Server IP: 10.66.0.5
Site B:
- VLAN 120:
- Should not have visibility to VLANs 10, 30, 40 and 100.
- Should have access to the following DMZ Servers (excluding FTP):
- Email Server IP: 10.66.0.4
- HTTPS-Syslog Server IP: 10.66.0.2
- DNS Server IP: 10.66.0.5
Common VLANs (20 and 220):
- VLANs 20 and 220:
- Should not have visibility to VLANs 10, 30, 40 and 100.
- Should have access to the following DMZ Servers (excluding FTP):
- HTTPS-Syslog Server IP: 10.66.0.2
- Email Server IP: 10.66.0.4
- DNS Server IP: 10.66.0.5
Admin Access:
- VLAN 100 (Admins):
- Should have access to everything, including:
- All DMZ servers (FTP, HTTPS-Syslog, Email, DNS)
- Ability to ping all networks
- Visibility to all other VLANs.
VLAN Visibility Summary:
- VLANs 10, 30, and 40: Should not see or communicate with each other.
- VLANs 20, 120, and 220: Should not see or communicate with any other VLANs.
NAT Access:
- All VLANs: Should have access to the NAT network for outbound internet connectivity