<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Policy to deny access to internal networks but allow access externally not working in ExtremeCloud IQ- Site Engine Management Center</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/policy-to-deny-access-to-internal-networks-but-allow-access/m-p/33054#M3565</link>
    <description>&lt;P&gt;Not sure. The customer never got back with me on the test switch we were working with. However GTAC had tested with the updated firmware successfully.&amp;nbsp; Sometimes the firmware bug fixes don’t make it across firmware forks immediately. I would try the 22.5.1.7 latest patch and see if that works for you.&lt;/P&gt;&lt;P&gt;On your policy I would block all internal network access and just allow ports such as DHCP and DNS, that should get you internet access without internal access.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 27 Oct 2020 03:23:00 GMT</pubDate>
    <dc:creator>Brian_Anderson1</dc:creator>
    <dc:date>2020-10-27T03:23:00Z</dc:date>
    <item>
      <title>Policy to deny access to internal networks but allow access externally not working</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/policy-to-deny-access-to-internal-networks-but-allow-access/m-p/33049#M3560</link>
      <description>Working with Exos, S-series router and Policy Manager.  &lt;BR /&gt;
&lt;BR /&gt;
Currently working with a customer, and I've setup a policy to deny 10.0.0.0/8 but allow 10.0.0.0/24.  Precedence shows this should work.  I also have allow DNS, DHCP and ARP.  In the past with EOS, allow ARP allows the workstation to access the network via the gateway.  I believe the workstation just arps up its gateway and uses the mac address for network access.  I can't get that to work on EXOS.  I've setup a rule to allow to the mac address of the s-series and that works, however I'm able to access everything on the 10 network that I've setup as a deny.  Same result when I just allow the IP address of the gateway of the workstation (10.190.0.1).  Has anybody setup this type of scenario with EXOS?  I've got a case open, and they are looking at the switching side of things being the cause.  I've upgraded to the latest code on the EXOS and still doesn't work.  Just seeing if anybody else has run into this before and if there is a solution before I go down the ACL road.  Thanks.</description>
      <pubDate>Mon, 21 May 2018 23:52:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/policy-to-deny-access-to-internal-networks-but-allow-access/m-p/33049#M3560</guid>
      <dc:creator>Brian_Anderson</dc:creator>
      <dc:date>2018-05-21T23:52:00Z</dc:date>
    </item>
    <item>
      <title>RE: Policy to deny access to internal networks but allow access externally not working</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/policy-to-deny-access-to-internal-networks-but-allow-access/m-p/33050#M3561</link>
      <description>Hi Brian, could you share the ACL that you have applied. #show policy &lt;NAME&gt;&lt;/NAME&gt;</description>
      <pubDate>Sun, 27 May 2018 19:09:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/policy-to-deny-access-to-internal-networks-but-allow-access/m-p/33050#M3561</guid>
      <dc:creator>Sushruth_Sathya</dc:creator>
      <dc:date>2018-05-27T19:09:00Z</dc:date>
    </item>
    <item>
      <title>RE: Policy to deny access to internal networks but allow access externally not working</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/policy-to-deny-access-to-internal-networks-but-allow-access/m-p/33051#M3562</link>
      <description>I don't have ACLs currently in place.  That is probably the solution I'll have to go with, unfortunately.  Haven't heard any progress from GTAC side yet.</description>
      <pubDate>Tue, 29 May 2018 23:27:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/policy-to-deny-access-to-internal-networks-but-allow-access/m-p/33051#M3562</guid>
      <dc:creator>Brian_Anderson</dc:creator>
      <dc:date>2018-05-29T23:27:00Z</dc:date>
    </item>
    <item>
      <title>RE: Policy to deny access to internal networks but allow access externally not working</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/policy-to-deny-access-to-internal-networks-but-allow-access/m-p/33052#M3563</link>
      <description>FYI, received a response from GTAC, v22.5.1.7 is supposed to work.  I haven't had a chance to test yet.</description>
      <pubDate>Thu, 12 Jul 2018 19:18:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/policy-to-deny-access-to-internal-networks-but-allow-access/m-p/33052#M3563</guid>
      <dc:creator>Brian_Anderson1</dc:creator>
      <dc:date>2018-07-12T19:18:00Z</dc:date>
    </item>
    <item>
      <title>RE: Policy to deny access to internal networks but allow access externally not working</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/policy-to-deny-access-to-internal-networks-but-allow-access/m-p/33053#M3564</link>
      <description>&lt;P&gt;We are on v22.6.1.4-patch 1.&amp;nbsp; Trying to get the same sort of policy set up that allows PCs to get to the internet but not the internal networks (for some IoT types).&amp;nbsp; This thread looked promising but there is no solution posted.&amp;nbsp; Did you ever get this to work?&amp;nbsp; If so - please share &lt;span class="lia-inline-image-display-wrapper" image-alt="b37f477866f245c89649f757905f45a1_1f601.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/3386i61D22F182A62CB9A/image-size/large?v=v2&amp;amp;px=999" role="button" title="b37f477866f245c89649f757905f45a1_1f601.png" alt="b37f477866f245c89649f757905f45a1_1f601.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 13:05:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/policy-to-deny-access-to-internal-networks-but-allow-access/m-p/33053#M3564</guid>
      <dc:creator>TRC_Sysadmins</dc:creator>
      <dc:date>2020-10-26T13:05:00Z</dc:date>
    </item>
    <item>
      <title>RE: Policy to deny access to internal networks but allow access externally not working</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/policy-to-deny-access-to-internal-networks-but-allow-access/m-p/33054#M3565</link>
      <description>&lt;P&gt;Not sure. The customer never got back with me on the test switch we were working with. However GTAC had tested with the updated firmware successfully.&amp;nbsp; Sometimes the firmware bug fixes don’t make it across firmware forks immediately. I would try the 22.5.1.7 latest patch and see if that works for you.&lt;/P&gt;&lt;P&gt;On your policy I would block all internal network access and just allow ports such as DHCP and DNS, that should get you internet access without internal access.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 03:23:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/policy-to-deny-access-to-internal-networks-but-allow-access/m-p/33054#M3565</guid>
      <dc:creator>Brian_Anderson1</dc:creator>
      <dc:date>2020-10-27T03:23:00Z</dc:date>
    </item>
  </channel>
</rss>

