The hardest part of access control lists, in my view, is the proper placement of them. I can write them and know the protocols
and so on and so on. So I'm looking for the Gurus to give me their simple rule on where to place them. Theory tells us extended go to the source and standard go to the destination. But Ive been working with Lammle's bonus labs and his solutions don't follow the standard rules..Refer to the exhibit below. I have a couple of hosts circled. Let's make it simple and say we dont want the circled ones to access the server, but everybody else can. Writing an acl is simple enough. What is the Guru decision process in deciding whether an ACL is placed inbound on an interface or outbound? That's the million dollar question.
Thanks