<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Block all but TCP by ACL on Extreme switch Summit300-48 in End of Service Products</title>
    <link>https://community.extremenetworks.com/t5/end-of-service-products/block-all-but-tcp-by-acl-on-extreme-switch-summit300-48/m-p/25091#M614</link>
    <description>I really don't know exactly how those access-lists/masks work, but shouldn't you also allow ARP on that port?&lt;BR /&gt;
I've accidentally blocked ARP before, and the results weren't pretty &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;BR /&gt;</description>
    <pubDate>Wed, 14 Sep 2016 16:32:00 GMT</pubDate>
    <dc:creator>Frank</dc:creator>
    <dc:date>2016-09-14T16:32:00Z</dc:date>
    <item>
      <title>Block all but TCP by ACL on Extreme switch Summit300-48</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/block-all-but-tcp-by-acl-on-extreme-switch-summit300-48/m-p/25090#M613</link>
      <description>I'm trying to understand access list’s mechanism on Extreme switch Summit300-48. Want to deny anything but TCP on specific port. So settings such commands:&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;create access-mask port_mask ports precedence 25000&lt;BR /&gt;create access-list denyall port_mask ports 1:43 deny  create access-mask ipproto_mask ip-protocol ports precedence 15000  create access-list allowTCP ipproto_mask ip-protocol TCP ports 1:43 permit  &lt;/PRE&gt;&lt;/DIV&gt;And It doesn’t work. It looks like all incoming traffic on port 1:43 is blocked. ACL generally work on this switch. For example I could block all TCP and open only for specific IP. What am I doing wrong? Help me please.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 13 Sep 2016 17:39:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/block-all-but-tcp-by-acl-on-extreme-switch-summit300-48/m-p/25090#M613</guid>
      <dc:creator>Andrzej_Kenig</dc:creator>
      <dc:date>2016-09-13T17:39:00Z</dc:date>
    </item>
    <item>
      <title>RE: Block all but TCP by ACL on Extreme switch Summit300-48</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/block-all-but-tcp-by-acl-on-extreme-switch-summit300-48/m-p/25091#M614</link>
      <description>I really don't know exactly how those access-lists/masks work, but shouldn't you also allow ARP on that port?&lt;BR /&gt;
I've accidentally blocked ARP before, and the results weren't pretty &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 14 Sep 2016 16:32:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/block-all-but-tcp-by-acl-on-extreme-switch-summit300-48/m-p/25091#M614</guid>
      <dc:creator>Frank</dc:creator>
      <dc:date>2016-09-14T16:32:00Z</dc:date>
    </item>
    <item>
      <title>RE: Block all but TCP by ACL on Extreme switch Summit300-48</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/block-all-but-tcp-by-acl-on-extreme-switch-summit300-48/m-p/25092#M615</link>
      <description>Hello Andrzej, I agreed with Frank. When using a "denyall" rule you might be blocking ARP packets also.&lt;BR /&gt;
&lt;BR /&gt;
I would suggest you to add the following rule and test again:&lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;create access-mask allowarpmask ethertype ports precedence 1000&lt;BR /&gt;
&lt;/I&gt;&lt;I&gt;create access-list allowarp access-mask allowarpmask ethertype 0x0806 ports 1:43 permit&lt;/I&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 14 Sep 2016 19:52:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/block-all-but-tcp-by-acl-on-extreme-switch-summit300-48/m-p/25092#M615</guid>
      <dc:creator>Henrique</dc:creator>
      <dc:date>2016-09-14T19:52:00Z</dc:date>
    </item>
    <item>
      <title>RE: Block all but TCP by ACL on Extreme switch Summit300-48</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/block-all-but-tcp-by-acl-on-extreme-switch-summit300-48/m-p/25093#M616</link>
      <description>It works! Exactly after adding your’s rules, Henrique, it works like it should to.In fact without arp allowed, it was working for the few seconds until host forget it’s local arp table. Now it works with no problems.&lt;BR /&gt;
&lt;BR /&gt;
Thank You very much!&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 15 Sep 2016 17:51:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/block-all-but-tcp-by-acl-on-extreme-switch-summit300-48/m-p/25093#M616</guid>
      <dc:creator>Andrzej_Kenig</dc:creator>
      <dc:date>2016-09-15T17:51:00Z</dc:date>
    </item>
    <item>
      <title>RE: Block all but TCP by ACL on Extreme switch Summit300-48</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/block-all-but-tcp-by-acl-on-extreme-switch-summit300-48/m-p/25094#M617</link>
      <description>Hi Andrzej, glad to hear that worked!&lt;BR /&gt;
&lt;BR /&gt;
Thanks for the feedback.&lt;BR /&gt;</description>
      <pubDate>Thu, 15 Sep 2016 17:51:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/block-all-but-tcp-by-acl-on-extreme-switch-summit300-48/m-p/25094#M617</guid>
      <dc:creator>Henrique</dc:creator>
      <dc:date>2016-09-15T17:51:00Z</dc:date>
    </item>
  </channel>
</rss>

