Hello,
I have created in our switch core the below access list.
access-list 100 permit ip 192.168.100.0 0.0.0.255 any
access-list 100 remark --[Allow Guest DNS requests to DNS Server]--
access-list 100 permit udp 192.168.100.0 0.0.0.255 host 192.168.101.2 eq domain
access-list 100 remark [Necessary for DHCP Server to receive Client requests]
access-list 100 permit udp any any eq bootps
access-list 100 permit udp any any eq bootpc
access-list 100 remark --[Deny Guest Access to other VLANs]--
access-list 100 deny ip 192.168.100.0 0.0.0.255 192.168.101.0 0.0.0.255 log
access-list 100 deny ip 192.168.100.0 0.0.0.255 192.168.102.0 0.0.0.255 log
access-list 100 deny ip 192.168.100.0 0.0.0.255 192.168.103.0 0.0.0.255 log
access-list 100 deny ip 192.168.100.0 0.0.0.255 192.168.104.0 0.0.0.255 log
access-list 100 deny ip 192.168.100.0 0.0.0.255 192.168.105.0 0.0.0.255 log
access-list 100 remark --[Permit Guest Access to everywhere else -Internet ]--
access-list 100 remark
Then in the Vlan 100 I have:
interface Vlan52
ip address 192.168.100.251 255.255.255.0
ip access-group 100 in
ip helper-address 192.168.101.2
The users that are connected to the Vlan100 they can navigate the internet, and thats fine, the problem, is that, they can still access the other vlans, I have connected to the vlan100 from my ipad, and I can scan all the other vlans. I want the vlan 100 to not be able to scan the other vlans or access the other vlans.
What I am doing wrong?
thank you
I have created in our switch core the below access list.
access-list 100 permit ip 192.168.100.0 0.0.0.255 any
access-list 100 remark --[Allow Guest DNS requests to DNS Server]--
access-list 100 permit udp 192.168.100.0 0.0.0.255 host 192.168.101.2 eq domain
access-list 100 remark [Necessary for DHCP Server to receive Client requests]
access-list 100 permit udp any any eq bootps
access-list 100 permit udp any any eq bootpc
access-list 100 remark --[Deny Guest Access to other VLANs]--
access-list 100 deny ip 192.168.100.0 0.0.0.255 192.168.101.0 0.0.0.255 log
access-list 100 deny ip 192.168.100.0 0.0.0.255 192.168.102.0 0.0.0.255 log
access-list 100 deny ip 192.168.100.0 0.0.0.255 192.168.103.0 0.0.0.255 log
access-list 100 deny ip 192.168.100.0 0.0.0.255 192.168.104.0 0.0.0.255 log
access-list 100 deny ip 192.168.100.0 0.0.0.255 192.168.105.0 0.0.0.255 log
access-list 100 remark --[Permit Guest Access to everywhere else -Internet ]--
access-list 100 remark
Then in the Vlan 100 I have:
interface Vlan52
ip address 192.168.100.251 255.255.255.0
ip access-group 100 in
ip helper-address 192.168.101.2
The users that are connected to the Vlan100 they can navigate the internet, and thats fine, the problem, is that, they can still access the other vlans, I have connected to the vlan100 from my ipad, and I can scan all the other vlans. I want the vlan 100 to not be able to scan the other vlans or access the other vlans.
What I am doing wrong?
thank you