Not sure I understand how you are running your network, but if you deny the
lawyers VLAN from accessing the other VLAN's in your network, you should be
all set.  That way you only have one deny statement to add to each VLAN.  I
think what's throwing me is the 300 line access-list statement.  There's a
ton of solutions out there for you, but you need to be more clear in terms
of describing your internal network.


""Robert Edmonds""  wrote in message
news:200210181908.TAA09447@;groupstudy.com...
> I work for a county government.  As part of building a new courthouse, I
am
> tasked with providing attorneys in courtrooms with Internet access through
> my network.  Of course, I would like to provide them access to what they
> need while blocking access to our internal network.
> My network is setup in the following manner:
> In the new courthouse, the MDF has a 3550-12G acting as the root switch
for
> the building, and has the layer 3 image.  It connects directly to my core,
> with a 6506 with Sup2 and MSFC2, which in turn connects to my PIX 515 for
> Internet access.  I plan on creating a separate VLAN for the public
Internet
> access, but beyond that I'm left a bit short.  Obviously I don't want to
> create a 300 line access-list that would deny them access to each internal
> VLAN, then each of our servers in turn.  Can someone give me some
> suggestions to get this done?  Thanks in advance.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=55899&t=55898
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to