I just read your post regarding VLANs & Frame Relay - I assume this is the one you refer to?
OK. Your central site uses a Layer-3 Catalyst 4500. You currently have 10 VLAN's and you have ACLs applied restricting access between VLANs?
You have a FR WAN with 4 remote sites? You don't state how these currently connect, although you state that they must be on VLANs? Can't quite see the logic here but I'll continue. You say the routers are 2600 - how and where are these connected and how many are there?
It would seem that you probably have a routed WAN and what you want to achieve is to restrict what each of these remote FR sites can connect to at the Core site? If this is the case you need to build a list of source & destination IP networks/hosts etc that should be allowed and denied.
For example remote site A is subnet 10.10.10.0/24. At the central site you have a VLAN - VLAN#20 10.20.20.0/24, on this VLAN are 2 servers X (10.20.20.20) and Y (10.20.20.30). Users at the remote subnet need to access server X but NOT Y. From this information you would create an ACL as follows:
ip access-list extended Site-A-Restrictions
permit ip 10.10.10.0 0.0.0.255 host 10.20.20.20
deny ip 10.10.10.0 0.0.0.255 host 10.20.20.30
!
interface VLAN 20
ip address 10.20.20.1 255.255.255.0
ip access-group Site-A-Restrictions out
That is pretty simplified but you should get the idea. Once you have your list you can then create your ACL's and apply them. Bear in mind you can only have 1 inboudn and 1 outbound IP ACL per interface so you will probably need to combine things. Once other thing to understand is the implicit deny at the end of an ACL, this will stop any other traffic that doesn't explicitly match an entry in the ACL. You can overide this default action by add the line 'ip permit any any' to the end of the ACL.
Andy