Solved

acls not applied to any interfaces on l3 switch

Posted on 2014-01-13
4
221 Views
Last Modified: 2014-01-15
Hi All,

I am working on a L3 switch with about 300 ports and someone created a ton of access-lists, maybe 200 lines worth but none are applied to any interfaces.  

Why would someone spend so much time and not apply any of the acls?  

Just trying to understand, maybe it was not intentional that they did not apply but since I asked around others on my team, no one knows I figured I'd see what others had to say in terms of what comes to mind first.

Thanks,
R
0
Comment
Question by:rotarypwr
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 26

Assisted Solution

by:pony10us
pony10us earned 167 total points
ID: 39777767
One possibility is that they were assigned to interfaces at the time they were created and have not been removed when no longer needed.  We are in the process of cleaning up our routers and L3 switches from just that situation.  

Some technicians get in a hurry and remove the assignment but don't complete the process thinking they will do it later.
0
 
LVL 46

Assisted Solution

by:Craig Beck
Craig Beck earned 166 total points
ID: 39777995
They may have been created to log certain types of traffic, or to/from specific IP addresses or ports, for example.

You can log traffic in real-time based on an ACL.
0
 
LVL 26

Accepted Solution

by:
Soulja earned 167 total points
ID: 39780120
They could have possibly been used for an interface in the past, but you must also remember ALC's aren't just used to enforce security on interfaces but are also used for match traffic for route maps, distribute lists, etc.
0
 

Author Closing Comment

by:rotarypwr
ID: 39784419
All good answers.  Thank you for your guidance.
0

Featured Post

[Webinar] Code, Load, and Grow

Managing multiple websites, servers, applications, and security on a daily basis? Join us for a webinar on May 25th to learn how to simplify administration and management of virtual hosts for IT admins, create a secure environment, and deploy code more effectively and frequently.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In the world of WAN, QoS is a pretty important topic for most, if not all, networks. Some WAN technologies have QoS mechanisms built in, but others, such as some L2 WAN's, don't have QoS control in the provider cloud.
Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question