<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VDX 6740 - How to control L3 traffic flow between vlans - with ACLs? in Data Center (VDX)</title>
    <link>https://community.extremenetworks.com/t5/data-center-vdx/vdx-6740-how-to-control-l3-traffic-flow-between-vlans-with-acls/m-p/88871#M618</link>
    <description>What monstrosity is that?&lt;BR /&gt;
How to read this notation?</description>
    <pubDate>Sat, 23 Feb 2019 21:19:05 GMT</pubDate>
    <dc:creator>Pawel_Eljasz</dc:creator>
    <dc:date>2019-02-23T21:19:05Z</dc:date>
    <item>
      <title>VDX 6740 - How to control L3 traffic flow between vlans - with ACLs?</title>
      <link>https://community.extremenetworks.com/t5/data-center-vdx/vdx-6740-how-to-control-l3-traffic-flow-between-vlans-with-acls/m-p/88866#M613</link>
      <description>hi guys&lt;BR /&gt;
&lt;BR /&gt;
if I need to allow only certain nodes to access vlans behind VE iface do I do it with ACLs?&lt;BR /&gt;
&lt;BR /&gt;
I think of that VE on VlanZ as a gateway to those nodes, through which the nodes would get to other Vlans.&lt;BR /&gt;
&lt;BR /&gt;
Would I need to construct ACLs with all the subnets &amp;amp; hosts or there is another, simpler way?&lt;BR /&gt;
&lt;BR /&gt;
And if yes, them I'm trying but... I fail. How would such a rule look like?&lt;BR /&gt;
I'm trying something obvious:&lt;BR /&gt;
&lt;BR /&gt;
deny ip any 10.5.8.0 255.255.255.0&lt;BR /&gt;
&lt;BR /&gt;
then apply it to the VE iface as ingress, but... nodes which have VE's IP as the gateway to 10.5.8.0/24 still get there.&lt;BR /&gt;
&lt;BR /&gt;
many thanks.</description>
      <pubDate>Wed, 20 Feb 2019 01:17:41 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/data-center-vdx/vdx-6740-how-to-control-l3-traffic-flow-between-vlans-with-acls/m-p/88866#M613</guid>
      <dc:creator>Pawel_Eljasz</dc:creator>
      <dc:date>2019-02-20T01:17:41Z</dc:date>
    </item>
    <item>
      <title>Re: VDX 6740 - How to control L3 traffic flow between vlans - with ACLs?</title>
      <link>https://community.extremenetworks.com/t5/data-center-vdx/vdx-6740-how-to-control-l3-traffic-flow-between-vlans-with-acls/m-p/88867#M614</link>
      <description>Or for such purposes ACL is not enough and Policy-Based Routing is necessary?</description>
      <pubDate>Wed, 20 Feb 2019 22:29:41 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/data-center-vdx/vdx-6740-how-to-control-l3-traffic-flow-between-vlans-with-acls/m-p/88867#M614</guid>
      <dc:creator>Pawel_Eljasz</dc:creator>
      <dc:date>2019-02-20T22:29:41Z</dc:date>
    </item>
    <item>
      <title>Re: VDX 6740 - How to control L3 traffic flow between vlans - with ACLs?</title>
      <link>https://community.extremenetworks.com/t5/data-center-vdx/vdx-6740-how-to-control-l3-traffic-flow-between-vlans-with-acls/m-p/88868#M615</link>
      <description>Can you try using hard-drop instead? &lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;device(config)# ip access-list extended ipv4-acl-example&lt;BR /&gt;device(conf-ipacl-ext)# hard-drop ip any 10.5.8.0 255.255.255.0&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
It's not clear on how you want to block the traffic. You want to apply the ACL at the VE to block hosts which are using that VE as their gateway from talking to other hosts on the same subnet? &lt;BR /&gt;
&lt;BR /&gt;
Also, please provide a bit more details ( hosts source and destination IP and topology).</description>
      <pubDate>Thu, 21 Feb 2019 07:01:06 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/data-center-vdx/vdx-6740-how-to-control-l3-traffic-flow-between-vlans-with-acls/m-p/88868#M615</guid>
      <dc:creator>Truyen_Phan</dc:creator>
      <dc:date>2019-02-21T07:01:06Z</dc:date>
    </item>
    <item>
      <title>Re: VDX 6740 - How to control L3 traffic flow between vlans - with ACLs?</title>
      <link>https://community.extremenetworks.com/t5/data-center-vdx/vdx-6740-how-to-control-l3-traffic-flow-between-vlans-with-acls/m-p/88869#M616</link>
      <description>Tried hard-drop, did not work neither.&lt;BR /&gt;
&lt;BR /&gt;
Again: "I think of that VE on VlanZ as a gateway to those nodes, through which the nodes would get to other Vlans."&lt;BR /&gt;
&lt;BR /&gt;
Anything that travels to &amp;amp; through VE(which nodes would claim as the gateway). Ex.:&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;ip access-list extended protect-VLANs&lt;BR /&gt;seq 10 permit ip host 192.168.2.144 any&lt;BR /&gt;seq 50 deny ip any 10.5.8.0 255.255.255.0&lt;BR /&gt;seq 51 deny ip any 10.5.7.0 255.255.255.0&lt;BR /&gt;seq 90 permit ip any any&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
Replace deny with hard-drop, apply this ACL to VE and still nodes from 192.168.2.0/24 gets to nodes in/from vlan subnet 10.5.8.0.&lt;BR /&gt;
That VE in physical layer is a port group(two phys ports) which link to the "rest" of the world.&lt;BR /&gt;
&lt;BR /&gt;
Either it's some bug or ACLs cannot do that on their own, by design, and something else must along with ACLs must be fixed. Maybe PBR...&lt;BR /&gt;
&lt;BR /&gt;
I also thought that ACLs would just work. I come from, still use, Dell and there (slightly older PC62xx) it's only ACLs  you need to do the trick.</description>
      <pubDate>Thu, 21 Feb 2019 19:53:19 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/data-center-vdx/vdx-6740-how-to-control-l3-traffic-flow-between-vlans-with-acls/m-p/88869#M616</guid>
      <dc:creator>Pawel_Eljasz</dc:creator>
      <dc:date>2019-02-21T19:53:19Z</dc:date>
    </item>
    <item>
      <title>Re: VDX 6740 - How to control L3 traffic flow between vlans - with ACLs?</title>
      <link>https://community.extremenetworks.com/t5/data-center-vdx/vdx-6740-how-to-control-l3-traffic-flow-between-vlans-with-acls/m-p/88870#M617</link>
      <description>I just realized that your wild card mask has the wrong syntax. &lt;BR /&gt;
&lt;BR /&gt;
Please try this ACL to block subnet  10.5.8.0 /24 and 10.5.7.0/24&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;ip access-list extended protect-VLANs&lt;BR /&gt;seq 10 permit ip host 192.168.2.144 any&lt;BR /&gt;seq 50 deny ip any 10.5.8.0 0.0.0.255&lt;BR /&gt;seq 51 deny ip any 10.5.7.0 0.0.0.255&lt;BR /&gt;seq 90 permit ip any any&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 22 Feb 2019 17:54:07 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/data-center-vdx/vdx-6740-how-to-control-l3-traffic-flow-between-vlans-with-acls/m-p/88870#M617</guid>
      <dc:creator>Truyen_Phan</dc:creator>
      <dc:date>2019-02-22T17:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: VDX 6740 - How to control L3 traffic flow between vlans - with ACLs?</title>
      <link>https://community.extremenetworks.com/t5/data-center-vdx/vdx-6740-how-to-control-l3-traffic-flow-between-vlans-with-acls/m-p/88871#M618</link>
      <description>What monstrosity is that?&lt;BR /&gt;
How to read this notation?</description>
      <pubDate>Sat, 23 Feb 2019 21:19:05 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/data-center-vdx/vdx-6740-how-to-control-l3-traffic-flow-between-vlans-with-acls/m-p/88871#M618</guid>
      <dc:creator>Pawel_Eljasz</dc:creator>
      <dc:date>2019-02-23T21:19:05Z</dc:date>
    </item>
    <item>
      <title>Re: VDX 6740 - How to control L3 traffic flow between vlans - with ACLs?</title>
      <link>https://community.extremenetworks.com/t5/data-center-vdx/vdx-6740-how-to-control-l3-traffic-flow-between-vlans-with-acls/m-p/88872#M619</link>
      <description>When configuring ACLs on the VDX, the wildcard mask is inverted from the subnet mask. &lt;BR /&gt;
&lt;BR /&gt;
https://en.wikipedia.org/wiki/Wildcard_mask</description>
      <pubDate>Mon, 25 Feb 2019 03:45:10 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/data-center-vdx/vdx-6740-how-to-control-l3-traffic-flow-between-vlans-with-acls/m-p/88872#M619</guid>
      <dc:creator>Truyen_Phan</dc:creator>
      <dc:date>2019-02-25T03:45:10Z</dc:date>
    </item>
  </channel>
</rss>

