- Posts: 2
- Thank you received: 0
Use case scenarios for Access Control List
16 years 1 week ago #28120
by rockyv
Use case scenarios for Access Control List was created by rockyv
Hi I need some use case scenarios for an ACL implemented based on Layer 2 and Layer 3 header for an IP DSLAM. Can any body give some diagrammatical examples. Or else the theoritical scenarios
16 years 1 week ago #28150
by Chojin
CCNA / CCNP / CCNA - Security / CCIP / Prince2 / Checkpoint CCSA
Replied by Chojin on topic Re: Use case scenarios for Access Control List
[10.0.0.0/8] ---> 192.168.1.0/24
10 clients on 10.x.x.x
10 clients on 192.168.1.x
Allow 10.0.0.1 to connect to 5 clients on the other subnet
Allow 10.0.0.2 to connect to all clients over port 80 (Layer 4 )
Deny 2 192.168.1.2 and .3 to connect to 10.0.0.3
Deny the rest.
Simple scenario, but gives you the idea of ACL
10 clients on 10.x.x.x
10 clients on 192.168.1.x
Allow 10.0.0.1 to connect to 5 clients on the other subnet
Allow 10.0.0.2 to connect to all clients over port 80 (Layer 4 )
Deny 2 192.168.1.2 and .3 to connect to 10.0.0.3
Deny the rest.
Simple scenario, but gives you the idea of ACL
CCNA / CCNP / CCNA - Security / CCIP / Prince2 / Checkpoint CCSA
16 years 6 days ago #28190
by rockyv
Replied by rockyv on topic Thanks Chojin
Hi,
This is fine. But I wanted to know some higher level idea of the ACL. Some practical scenarios in which the ACL can be applied.
for eg: Blocking some malicious user based on his Source MAC Address.
This is fine. But I wanted to know some higher level idea of the ACL. Some practical scenarios in which the ACL can be applied.
for eg: Blocking some malicious user based on his Source MAC Address.
Time to create page: 0.115 seconds