Question : Setting up Access List on Catalyst 4506, IOS version 12.1(20)EW2

I am setting up two external and one internal networks on a Catalyst 4506.  

Internal Network:  VLAN1 -  172.16.0.0/16
External Network: VLAN2 - 10.138.56.79/24
                 VLAN3 - 10.138.58.161/28

How do I set up access list to prevent the two external networks from talking to the internal networks?  I know on a router, I don't need to set up
access list to achieve this.  



 

Answer : Setting up Access List on Catalyst 4506, IOS version 12.1(20)EW2

Actually, on a router you would indeed have to set up an ACL to achieve this. The 4506 configuration would be the same as it would be on a router. The ACL would just be applied to a VLAN interface as opposed to a FastEthernet/Ethernet/Serial interface on the router. The PIX firewall is the one that blocks traffic by default from a low security to a high security interface.
The ACL you would need would be something like:
!
access-list 101 deny 10.138.56.79 0.0.0.255 172.16.0.0 0.0.255.255
access-list 101 permit 10.138.56.79 0.0.0.255 any
access-list 102 deny 10.138.58.161 0.0.0.15 172.16.0.0 0.0.255.255
access-list 102 permit 10.138.58.161 0.0.0.15 any
!
interface VLAN2
   ip access-group 101 in
!
interface VLAN3
   ip access-group 102 in
Random Solutions  
 
programming4us programming4us