Solved

Block VLan access

Posted on 2013-01-08
3
292 Views
Last Modified: 2013-02-05
Hi,


I want to block access to a 10.x.x.x network from a 172.16.x.x vlan and not sure of the best way to do this. I was thinking of using extended access lists and simply applying those to the vlan but was wondering if there were any better suggestions which might make this more easier.
0
Comment
Question by:dcirona86
3 Comments
 
LVL 1

Expert Comment

by:thpipfh
ID: 38757661
I have given some example for this... please understand the same.

===============
ip access-list extended BAN_VLAN_20
permit tcp 10.10.20.0 0.0.0.255 established
deny   tcp 10.10.20.0 0.0.0.255 any
permit ip any any
!
interface Vlan100
description SVI_VLAN100
ip address 10.10.100.254 255.255.255.0
ip access-group BAN_VLAN_20 out
!
 
 
The above would block the 10.10.20.0 network from initiating access to the 10.10.100.0 network via TCP protocols such as Telnet or SSH.  However, if 10.10.100.0 network initiated the connection then with the "permit tcp 10.10.20.0 0.0.0.255 established" added the return traffic from the 10.10.20.0 network would be allowed.  This will allow the 10.10.100.0 network, your management Vlan, to access the 10.10.20.0 network hosts via TCP protocols, such as the Telnet and SSH for management.
 ========================
0
 
LVL 9

Accepted Solution

by:
Sandeep Gupta earned 250 total points
ID: 38757885
Hi,

Here is one good documnet to learn more on vlan access map, vlan acl..you can go thru it if time permits you.

http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/vacl.pdf
0
 
LVL 21

Expert Comment

by:eeRoot
ID: 38761141
For a small number of VLAN's that need to be isolated, ACL's are the best option.  For a large number of VLAN's, where managing a lot of ACL's would become difficult, you can use private VLAN's.

These articles from Cisco explain private VLAN's
http://www.cisco.com/en/US/tech/tk389/tk814/tk840/tsd_technology_support_sub-protocol_home.html
http://www.cisco.com/en/US/products/hw/switches/ps700/products_tech_note09186a008013565f.shtml
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Introduction This article explores the design of a cache system that can improve the performance of a web site or web application.  The assumption is that the web site has many more “read” operations than “write” operations (this is commonly the ca…
Creating an OSPF network that automatically (dynamically) reroutes network traffic over other connections to prevent network downtime.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now