01-03-2013 05:07 AM - edited 03-04-2019 06:33 PM
Hi,
We have an external company who need access to our network through an ISDN line so they can get access to a few of our applications. It is ok to patch their router into our Layer 3 switch which is on our OSPF network and then put an access-list on our L3 switch to only allow them access to the subnets where the servers are located.
Or is it better to do this with a Cisco 5520 ASA firewall between the two devices. So really - is the access-list secure enough?
Kevin
Solved! Go to Solution.
01-03-2013 06:43 AM
01-03-2013 06:43 AM
Hi,
If implemented properly this can be done using ACL's.
Thanks
01-16-2013 06:45 AM
I have the access-list in place. It can do a job for now until i get a chance to plug the isdn into the firewall.
thanks anyway,
Kevin
07-18-2013 01:30 AM
Access list can do blocking and permitting.. Then what is necessary of firewall over Access list..? can briefly explain the bugs in access list which can overcome by firewall..
07-18-2013 01:57 AM
hi Kevin,
to allow outside traffic Inside you will be require ACL to be configure. also i ll suggest you to configure ACL by permitting
that particular traffic to get the access of your servers.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide