• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Allowing internet access only

jlazzaro

Golden Member
Cisco 4510R, has about 9 vlans on it. One vlan is going to be used by guests for internet access only...they cannot touch our production network because of security and iava compliance.

Would the best way to block them be an access-list? Would you need a permit for DNS and DHCP, or just DNS? The interface is configured with an ip helper-address...

permit ip 192.168.62.0 0.0.0.255 host 192.168.60.21
permit ip 192.168.62.0 0.0.0.255 host 192.168.60.74

Then block them from reaching any other vlans on the segment...

deny ip 192.168.62.0 0.0.0.255 192.168.0.0 0.0.255.255
permit ip any any

Technically speaking, would you need to block the other segments from reaching the 62NET as well, or would this one sided acl be sufficient?

edit: also, is there any difference in the way an acl is handled between applying it to multiple physical interfaces or just applying it to a vlan that is assigned to multiple interfaces?
 
Back
Top