Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

3com 5500 ACL

Posted on 2012-03-15
4
Medium Priority
?
755 Views
Last Modified: 2012-03-24
Is it possible to create an ACL with a deny ip source and apply it to a VLAN?

For example: I have an IP source of 10.0.10.0 0.0.0.255 I only want that source range to be blocked from the other VLANS. Instead of adding a bunch of rules for the different IP ranges to an ACL, I would create 1 rule that denies any IP address from the 10.0.10.0 range to whatever VLAN I apply the rule to?

For example(not sure if my rule wording is totally correct):

ACL 3000

rule 1 deny ip source 10.0.10.0 0.0.0.255 destination any any

then apply that to say vlan 5, vlan 6, and vlan 8? But not to Vlan 3, Vlan 4, and Vlan 7 if they existed for example? That would block access from any IP in the 10.0.10.0 range to everything except VLAN 3, 4, and 7?

Thank you
0
Comment
Question by:heydude
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 1

Expert Comment

by:vinay1285
ID: 37726588
0
 

Author Comment

by:heydude
ID: 37727258
That all corresponds to Cisco stuff?
0
 

Accepted Solution

by:
heydude earned 0 total points
ID: 37729460
I am almost thinking that maybe this is being made harder than it needs to be. We have wx2200 wireless controller, couldn't I set an ACL on the controller to block the 10.0.10.0 range from going to any other vlan?
0
 

Author Closing Comment

by:heydude
ID: 37760310
Adding the acl to the vlan did not work. After much trial and error with my acl, I was able to get it somewhat working.
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question