I have a 3640 dial up router with a dialer pool of 10.92.1.100 10.92.1.200. What is the best way to keep each user that dials in from talking to each other? We are running into problems when a sales man doesn't keep their ant-virus defs up to date and they dial in with a virus it affects the other users that are dialed in. We would like to create an access-list or anything else that would keep the users from each other.
I would think a fairly simple access list of two lines would do here. Essentially you want a line that will deny traffic that has the dial pool as source address and has the dial pool as the destination address and you want a line that will permit everything else.
The syntax would look like this:
access-list 150 deny ip
access-list 150 permit ip any any
This access list would be assigned as an outbound filter on the dialer or async interface.
The syntax for your particular situation will get convoluted and complex because the range of addresses in your dial pool is not assigned on a bit boundary. So it would take multiple statements to define the range starting at 100 and extending to 200. If the dial pool were on a bit boundary, starting at 128 and going to 191 for example, the access list might look like:
access-list 150 deny ip 10.92.1.128 0.0.0.63 10.92.1.128 0.0.0.63
This is the sign you have been waiting for. It's the year you apply to become a Cisco Champion. As a Cisco Champion, you’ll:
Get early insights into new Cisco products and solutions
Receive access to Cisco’s engineering rock stars
Expand your ...
Discover how your network can power hybrid work with no compromise in security, agility, or experience.
Join us on Wednesday, February 23 at 10:00 AM PT / 1:00 PM ET for insights on innovations in Wi-Fi 6E, private 5G and more.
Hear from our panel of cus...
Listen: https://smarturl.it/CCRS9E3Follow us: https://twitter.com/CiscoChampion
Esports is booming and Cisco is taking a front seat in the future of Esports in a big way. Game publishers, professional teams, tournament organizers and venue owners ar...
Cisco recently announced the availability of the IOS-XE train – IOS-XE Cupertino 17.7.1. This is a standard maintenance release supporting switching, wireless, SP-Access, Routing as well as IoT (Internet of things) platforms with a sustaining support life...