Solved

Access Control list to setup firewall internal to our network

Posted on 2006-10-19
6
258 Views
Last Modified: 2013-11-16
We have a Police Department network which accesses services such as email, internet, file sharing/printing from the City Hall network.  I want to setup a firewall in such a way that the Police Department can access everything on the City Hall network.  I want nobody except the servers at City Hall be able to talk to servers at Police Department.

The Police Department is connected to City Hall using a fiber trunk.

The Police Department network is 172.22.0.0 and there gateway interface to City hall is 172.22.9.1

The City Hall network is 10.0.0.0 network.

Any help with a sample access list will greatly help.
0
Comment
Question by:rwcstaff
6 Comments
 
LVL 1

Accepted Solution

by:
Sean64 earned 125 total points
ID: 17770601
Here's a simple ACL (assuming all servers reside on 10.255.x.x subnetwork.
It would be helpfull to know what the subnet masks are at each site, as well as what type of firewall you're using to provide a better answer.

PERMIT 10.255.0.0 255.255.0.0 172.22.0.0 255.255.0.0
DENY ALL

0
 
LVL 3

Assisted Solution

by:tang_tzuchi
tang_tzuchi earned 125 total points
ID: 17771138
Hi,

Beside the ACL provided by Sean64, you can add another statement for all traffic Police Department to City Hall network:

PERMIT 172.22.0.0 255.255.0.0 10.0.0.0 255.0.0.0
PERMIT 10.255.0.0 255.255.0.0 172.22.0.0 255.255.0.0
DENY ALL
0
 

Author Comment

by:rwcstaff
ID: 17775025
Thanks Sean64 and Tang tzuchi.  Sean64, you had a question about the subnet mask on both sides.  It is 255.255.0.0.  Having said that will the ACL you are suggesting still valid.  Thanks.
0

Featured Post

Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question