01-22-2025 05:56 AM
Can someone help me create ACL? I want to got acl for 192.168.x.0, x=vlan 10,30,40,100 in site a and this network should got access to some dmz servers. Server ip FTP - 10.66.0.3, HTTPS-Syslog - 10.66.0.2, Email - 10.66.0.4 DNS - 10.66.0.5, vlan 20,220
and 120 from site b should got access to email, HTTPS and dns server, vlan 100- admins should can ping all the networks and different vlan should't can see other vlans with the exception of vlans 20,120,220.
Below I attach the Packet Tracer file
We appreciate your help
01-22-2025 07:13 AM - edited 01-22-2025 07:16 AM
mmm two seconds on chatgpt:
I'll help you create ACLs for this scenario. Let me break this down into clear requirements first:
Site A:
Site B:
Special Requirements:
Result:
! ACL for Site A VLANs (10,30,40) access to DMZ
ip access-list extended SITE_A_TO_DMZ
permit tcp 192.168.10.0 0.0.0.255 host 10.66.0.3 eq ftp
permit tcp 192.168.10.0 0.0.0.255 host 10.66.0.2 eq 443
permit tcp 192.168.10.0 0.0.0.255 host 10.66.0.4 eq smtp
permit udp 192.168.10.0 0.0.0.255 host 10.66.0.5 eq domain
permit tcp 192.168.30.0 0.0.0.255 host 10.66.0.3 eq ftp
permit tcp 192.168.30.0 0.0.0.255 host 10.66.0.2 eq 443
permit tcp 192.168.30.0 0.0.0.255 host 10.66.0.4 eq smtp
permit udp 192.168.30.0 0.0.0.255 host 10.66.0.5 eq domain
permit tcp 192.168.40.0 0.0.0.255 host 10.66.0.3 eq ftp
permit tcp 192.168.40.0 0.0.0.255 host 10.66.0.2 eq 443
permit tcp 192.168.40.0 0.0.0.255 host 10.66.0.4 eq smtp
permit udp 192.168.40.0 0.0.0.255 host 10.66.0.5 eq domain
deny ip any any
! ACL for Site B VLANs (20,120,220) access to specific DMZ servers ip access-list extended SITE_B_TO_DMZ
permit tcp 192.168.20.0 0.0.0.255 host 10.66.0.4 eq smtp
permit tcp 192.168.20.0 0.0.0.255 host 10.66.0.2 eq 443
permit udp 192.168.20.0 0.0.0.255 host 10.66.0.5 eq domain
permit tcp 192.168.120.0 0.0.0.255 host 10.66.0.4 eq smtp
permit tcp 192.168.120.0 0.0.0.255 host 10.66.0.2 eq 443
permit udp 192.168.120.0 0.0.0.255 host 10.66.0.5 eq domain
permit tcp 192.168.220.0 0.0.0.255 host 10.66.0.4 eq smtp
permit tcp 192.168.220.0 0.0.0.255 host 10.66.0.2 eq 443
permit udp 192.168.220.0 0.0.0.255 host 10.66.0.5 eq domain
deny ip any any
! ACL for Admin VLAN 100 - allowing ping to all networks
ip access-list extended ADMIN_VLAN_100
permit icmp 192.168.100.0 0.0.0.255 any
permit ip 192.168.100.0 0.0.0.255 any
deny ip any any
! ACL for inter-VLAN communication between Site B VLANs
ip access-list extended SITE_B_INTER_VLAN
permit ip 192.168.20.0 0.0.0.255 192.168.120.0 0.0.0.255
permit ip 192.168.20.0 0.0.0.255 192.168.220.0 0.0.0.255
permit ip 192.168.120.0 0.0.0.255 192.168.20.0 0.0.0.255
permit ip 192.168.120.0 0.0.0.255 192.168.220.0 0.0.0.255
permit ip 192.168.220.0 0.0.0.255 192.168.20.0 0.0.0.255
permit ip 192.168.220.0 0.0.0.255 192.168.120.0 0.0.0.255
deny ip any any
I encourage you to do it yourself and check the result
01-22-2025 09:32 AM
@Gerard Paulino ye but it doesnt work, if it will be fine i dont want to help
01-22-2025 08:31 AM
I believe the file attached must attend most of your requirements.
01-22-2025 09:26 AM
Hey bro, i got a last request. Could u try to do this for my. If u do that u will be my guardian angel:
Site A:
Site B:
Common VLANs (20 and 220):
Admin Access:
VLAN Visibility Summary:
NAT Access:
01-22-2025 09:35 AM
Take the Access list I applied to the router below and use as example. Get busy man! We are not here to do your assignment. We can help you in specific subjects.
01-22-2025 09:37 AM
great thanks man
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide