Solved

Access Control list to setup firewall internal to our network

Posted on 2006-10-19
6
256 Views
Last Modified: 2013-11-16
We have a Police Department network which accesses services such as email, internet, file sharing/printing from the City Hall network.  I want to setup a firewall in such a way that the Police Department can access everything on the City Hall network.  I want nobody except the servers at City Hall be able to talk to servers at Police Department.

The Police Department is connected to City Hall using a fiber trunk.

The Police Department network is 172.22.0.0 and there gateway interface to City hall is 172.22.9.1

The City Hall network is 10.0.0.0 network.

Any help with a sample access list will greatly help.
0
Comment
Question by:rwcstaff
6 Comments
 
LVL 1

Accepted Solution

by:
Sean64 earned 125 total points
ID: 17770601
Here's a simple ACL (assuming all servers reside on 10.255.x.x subnetwork.
It would be helpfull to know what the subnet masks are at each site, as well as what type of firewall you're using to provide a better answer.

PERMIT 10.255.0.0 255.255.0.0 172.22.0.0 255.255.0.0
DENY ALL

0
 
LVL 3

Assisted Solution

by:tang_tzuchi
tang_tzuchi earned 125 total points
ID: 17771138
Hi,

Beside the ACL provided by Sean64, you can add another statement for all traffic Police Department to City Hall network:

PERMIT 172.22.0.0 255.255.0.0 10.0.0.0 255.0.0.0
PERMIT 10.255.0.0 255.255.0.0 172.22.0.0 255.255.0.0
DENY ALL
0
 

Author Comment

by:rwcstaff
ID: 17775025
Thanks Sean64 and Tang tzuchi.  Sean64, you had a question about the subnet mask on both sides.  It is 255.255.0.0.  Having said that will the ACL you are suggesting still valid.  Thanks.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
When you try to share a printer , you may receive one of the following error messages. Error message when you use the Add Printer Wizard to share a printer: Windows could not share your printer. Operation could not be completed (Error 0x000006…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now