Skip to main content

Use case scenarios for Access Control List

More
15 years 10 months ago #28120 by rockyv
Hi I need some use case scenarios for an ACL implemented based on Layer 2 and Layer 3 header for an IP DSLAM. Can any body give some diagrammatical examples. Or else the theoritical scenarios
More
15 years 10 months ago #28150 by Chojin
[10.0.0.0/8] ---> 192.168.1.0/24

10 clients on 10.x.x.x
10 clients on 192.168.1.x

Allow 10.0.0.1 to connect to 5 clients on the other subnet
Allow 10.0.0.2 to connect to all clients over port 80 (Layer 4 :D)
Deny 2 192.168.1.2 and .3 to connect to 10.0.0.3
Deny the rest.

Simple scenario, but gives you the idea of ACL

CCNA / CCNP / CCNA - Security / CCIP / Prince2 / Checkpoint CCSA
More
15 years 10 months ago #28190 by rockyv
Replied by rockyv on topic Thanks Chojin
Hi,
This is fine. But I wanted to know some higher level idea of the ACL. Some practical scenarios in which the ACL can be applied.

for eg: Blocking some malicious user based on his Source MAC Address.
Time to create page: 0.133 seconds