Hot Downloads

Welcome, Guest
Username: Password: Remember me
  • Page:
  • 1

TOPIC: Use case scenarios for Access Control List

Use case scenarios for Access Control List 9 years 7 months ago #28120

  • rockyv
  • rockyv's Avatar Topic Author
  • Offline
  • New Member
  • New Member
  • Posts: 2
  • Thank you received: 0
Hi I need some use case scenarios for an ACL implemented based on Layer 2 and Layer 3 header for an IP DSLAM. Can any body give some diagrammatical examples. Or else the theoritical scenarios

Please Log in to join the conversation.

Re: Use case scenarios for Access Control List 9 years 7 months ago #28150

[10.0.0.0/8] ---> 192.168.1.0/24

10 clients on 10.x.x.x
10 clients on 192.168.1.x

Allow 10.0.0.1 to connect to 5 clients on the other subnet
Allow 10.0.0.2 to connect to all clients over port 80 (Layer 4 :D)
Deny 2 192.168.1.2 and .3 to connect to 10.0.0.3
Deny the rest.

Simple scenario, but gives you the idea of ACL

Please Log in to join the conversation.

CCNA / CCNP / CCNA - Security / CCIP / Prince2 / Checkpoint CCSA

Thanks Chojin 9 years 7 months ago #28190

  • rockyv
  • rockyv's Avatar Topic Author
  • Offline
  • New Member
  • New Member
  • Posts: 2
  • Thank you received: 0
Hi,
This is fine. But I wanted to know some higher level idea of the ACL. Some practical scenarios in which the ACL can be applied.

for eg: Blocking some malicious user based on his Source MAC Address.

Please Log in to join the conversation.

  • Page:
  • 1
Time to create page: 0.163 seconds

CCENT/CCNA

Cisco Routers

  • SSL WebVPN
  • Securing Routers
  • Policy Based Routing
  • Router on-a-Stick

VPN Security

  • Understand DMVPN
  • GRE/IPSec Configuration
  • Site-to-Site IPSec VPN
  • IPSec Modes

Cisco Help

  • VPN Client Windows 8
  • VPN Client Windows 7
  • CCP Display Problem
  • Cisco Support App.

Windows 2012

  • New Features
  • Licensing
  • Hyper-V / VDI
  • Install Hyper-V

Linux

  • File Permissions
  • Webmin
  • Groups - Users
  • Samba Setup