Solved

Access Control list to setup firewall internal to our network

Posted on 2006-10-19
6
260 Views
Last Modified: 2013-11-16
We have a Police Department network which accesses services such as email, internet, file sharing/printing from the City Hall network.  I want to setup a firewall in such a way that the Police Department can access everything on the City Hall network.  I want nobody except the servers at City Hall be able to talk to servers at Police Department.

The Police Department is connected to City Hall using a fiber trunk.

The Police Department network is 172.22.0.0 and there gateway interface to City hall is 172.22.9.1

The City Hall network is 10.0.0.0 network.

Any help with a sample access list will greatly help.
0
Comment
Question by:rwcstaff
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 1

Accepted Solution

by:
Sean64 earned 125 total points
ID: 17770601
Here's a simple ACL (assuming all servers reside on 10.255.x.x subnetwork.
It would be helpfull to know what the subnet masks are at each site, as well as what type of firewall you're using to provide a better answer.

PERMIT 10.255.0.0 255.255.0.0 172.22.0.0 255.255.0.0
DENY ALL

0
 
LVL 3

Assisted Solution

by:tang_tzuchi
tang_tzuchi earned 125 total points
ID: 17771138
Hi,

Beside the ACL provided by Sean64, you can add another statement for all traffic Police Department to City Hall network:

PERMIT 172.22.0.0 255.255.0.0 10.0.0.0 255.0.0.0
PERMIT 10.255.0.0 255.255.0.0 172.22.0.0 255.255.0.0
DENY ALL
0
 

Author Comment

by:rwcstaff
ID: 17775025
Thanks Sean64 and Tang tzuchi.  Sean64, you had a question about the subnet mask on both sides.  It is 255.255.0.0.  Having said that will the ACL you are suggesting still valid.  Thanks.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question