11-25-2018 06:21 PM - edited 03-05-2019 11:04 AM
Hey guys,
I have 3 sites; Parramatta, Chatswood and Ryde.
I need to create an ACL to block VLAN 10 (Student-Staff VLAN) talking with VLAN 20 (Admin VLAN). The VLAN's will still need to be able to talk to their corresponding VLAN across sites.
The site on the left is Parramatta
The site in the middle is Chatswood
The site on the right is Ryde
I originally created an extended access list in the Chatswood site that looked like this:
Chatswood(config)#ip access-list extended ADMIN-ACL
Chatswood(config-ext-nacl)#
Chatswood(config-ext-nacl)#
Chatswood(config-ext-nacl)#
Chatswood(config-ext-nacl)#
[Those 3 networks are the Student-Staff networks]
I then went into G0/0.20 (The admin sub interface)
Chatswood(config-subif)#ip access-group ADMIN-ACL in
However the student-staff vlans can still talk to the admin vlan in chatswood.
Thanks guys
Solved! Go to Solution.
11-25-2018 11:56 PM
Hi there,
You need to block the traffic leaving the Admin sub-interface:
! int gi0/0.20 ip access-group ADMIN-ACL out !
However if makes more sense to block the traffic at the earliest point, so blocking on ingress at the student-staff interface makes more sense. Now the ACL should be applied inbound:
! int gi0/0.10 ip access-group ADMIN-ACL in !
Cheers,
Seb.
11-25-2018 11:56 PM
Hi there,
You need to block the traffic leaving the Admin sub-interface:
! int gi0/0.20 ip access-group ADMIN-ACL out !
However if makes more sense to block the traffic at the earliest point, so blocking on ingress at the student-staff interface makes more sense. Now the ACL should be applied inbound:
! int gi0/0.10 ip access-group ADMIN-ACL in !
Cheers,
Seb.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide