Hot Downloads

Welcome, Guest
Username: Password: Remember me

TOPIC: Use case scenarios for Access Control List

Use case scenarios for Access Control List 8 years 3 weeks ago #28120

  • rockyv
  • rockyv's Avatar
  • Offline
  • New Member
  • Posts: 2
  • Karma: 0
Hi I need some use case scenarios for an ACL implemented based on Layer 2 and Layer 3 header for an IP DSLAM. Can any body give some diagrammatical examples. Or else the theoritical scenarios
The administrator has disabled public write access.

Re: Use case scenarios for Access Control List 8 years 3 weeks ago #28150

  • Chojin
  • Chojin's Avatar
  • Offline
  • Senior Member
  • Posts: 251
  • Karma: 0
[10.0.0.0/8] ---> 192.168.1.0/24

10 clients on 10.x.x.x
10 clients on 192.168.1.x

Allow 10.0.0.1 to connect to 5 clients on the other subnet
Allow 10.0.0.2 to connect to all clients over port 80 (Layer 4 :D)
Deny 2 192.168.1.2 and .3 to connect to 10.0.0.3
Deny the rest.

Simple scenario, but gives you the idea of ACL
CCNA / CCNP / CCNA - Security / CCIP / Prince2 / Checkpoint CCSA
The administrator has disabled public write access.

Thanks Chojin 8 years 3 weeks ago #28190

  • rockyv
  • rockyv's Avatar
  • Offline
  • New Member
  • Posts: 2
  • Karma: 0
Hi,
This is fine. But I wanted to know some higher level idea of the ACL. Some practical scenarios in which the ACL can be applied.

for eg: Blocking some malicious user based on his Source MAC Address.
The administrator has disabled public write access.
Time to create page: 0.073 seconds

CCENT/CCNA

Cisco Routers

  • SSL WebVPN
  • Securing Routers
  • Policy Based Routing
  • Router on-a-Stick

VPN Security

  • Understand DMVPN
  • GRE/IPSec Configuration
  • Site-to-Site IPSec VPN
  • IPSec Modes

Cisco Help

  • VPN Client Windows 8
  • VPN Client Windows 7
  • CCP Display Problem
  • Cisco Support App.

Windows 2012

  • New Features
  • Licensing
  • Hyper-V / VDI
  • Install Hyper-V

Linux

  • File Permissions
  • Webmin
  • Groups - Users
  • Samba Setup