I want to establish a setup at a customer location with enhanced security features, especially Layer2 access lists.
I hoped it would be possible to define access groups with specific ACLs to only allow known MAC addresses access to the network.
Applying these groups to VLANs doesn't seem possible because, if I'm not mistaken, these could only be applied to physical interfaces but this limitation seems acceptable as we are not going to use VMPS and have to configure VLAN changes manually, so we can also change the access group membership manually.
Using 802.1x is not (yet) desirable.
I was hardly looking to find some details according limits, as for example maximum number of access groups, layer2 acls or other limitations which might interfere with my desired setup.
There will be one access group per vlan and each port will get an access group assigned to prevent "untrusted" access to the network (in fact, trusting on mac addresses is not very secure either but nevertheless it's better than nothing)
One known limitation on layer3 (!) ACLs is the subnet mask which has to be the same for all ACLs on a single physical interface but this is not of interest for the described setup.
Perhaps someone has tried something similar and wants to tell about his/her experiences.
What is the best way to bridge the gap between business requirements and what a network can deliver? The answer is clear: Intent-based networking for the WAN. We know the journey is long and ongoing, but the good news is that the closer we get, the faster...
Whenever we create tunnel interfaces, the GRE IP MTU is automatically configured 24 bytes less than the outbound physical interface MTU. Ethernet interfaces have an MTU value of 1500 bytes. Tunnel interfaces by default will have 1476 bytes MTU. 24...
Hi everyone, I am having Cisco switch 3750 48 port . I would like to know which NIM will support my switch. And weather it will support both Fiber optic and copper wire(Ethernet). Please let me know the part number of the NIM which would support the switc...