<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Convert EOS to EXOS policy-based Routing in ExtremeSwitching (EOS)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-eos/convert-eos-to-exos-policy-based-routing/m-p/59783#M1717</link>
    <description>Hi Matthias,&lt;BR /&gt;
&lt;BR /&gt;
You can create a policy file containing the deny and redirect rules.  For example to redirect traffic from a subnet 10.1.0.0/16 to 10.1.1.1, the policy would look like:&lt;BR /&gt;
entry &lt;RULE-NAME&gt; { if { source-address &lt;I&gt;; } then { redirect &lt;I&gt; ; } }entry redirect-rule-1 { if { source-address 10.1.0.0/16 ; } then { redirect 10.1.1.1 ; } }apply this policy to the ingress traffic of a VLAN&lt;BR /&gt;
&lt;BR /&gt;
You can also add additional rules for the sources you wish to deny access:&lt;BR /&gt;
entry deny-rule-1 { if { source-address 192.168.0.1/32 ; } then { deny ; count Deny-1 } }The &lt;B&gt;count&lt;/B&gt; condition on the deny rule is optional, but for troubleshooting purposes can be very helpful in understanding whether the rule is affecting any traffic.&lt;BR /&gt;
&lt;BR /&gt;
You can add multiple sources to a rule and use the &lt;B&gt;Match Any&lt;/B&gt; condition on the rule&lt;BR /&gt;
entry &lt;RULE-NAME&gt; match any { if { source address &lt;I&gt; ; source address &lt;I&gt;} then { deny ; }}I hope this helps&lt;BR /&gt;
&lt;BR /&gt;&lt;/I&gt;&lt;/I&gt;&lt;/RULE-NAME&gt;&lt;/I&gt;&lt;/I&gt;&lt;/RULE-NAME&gt;</description>
    <pubDate>Mon, 14 Mar 2016 19:06:00 GMT</pubDate>
    <dc:creator>Kawawa</dc:creator>
    <dc:date>2016-03-14T19:06:00Z</dc:date>
    <item>
      <title>Convert EOS to EXOS policy-based Routing</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/convert-eos-to-exos-policy-based-routing/m-p/59782#M1716</link>
      <description>Currently i am converting an existing configuration from a legacy N7 device to a current X670 switch.&lt;BR /&gt;
&lt;BR /&gt;
Converting the EOS route-based policy to EXOS route-based policy i need some help.&lt;BR /&gt;
&lt;BR /&gt;
Existing EOS route-map:&lt;BR /&gt;
 ip access-list extended redirectACL&lt;BR /&gt;
  deny ip host 10.1.13.70 192.168.0.0 0.0.255.255&lt;BR /&gt;
  deny ip host 10.1.13.70 10.0.0.0 0.0.0.255&lt;BR /&gt;
  deny ip host 10.1.13.70 172.16.0.0 0.31.255.255&lt;BR /&gt;
  permit ip host 10.1.13.70 any&lt;BR /&gt;
  deny ip host 10.1.13.199 host 2.2.2.2&lt;BR /&gt;
  deny ip host 10.1.13.199 host 3.3.3.3&lt;BR /&gt;
  permit ip host 10.1.13.199 any&lt;BR /&gt;
   exit&lt;BR /&gt;
!&lt;BR /&gt;
 route-map policy Internet-FW permit 10&lt;BR /&gt;
  match ip address redirectACL&lt;BR /&gt;
  set next-hop 10.1.1.1&lt;BR /&gt;
  exit&lt;BR /&gt;
I use the deny statements for internal networks which routed based on the routing table. the permit statements have to be redicted to the firewall.&lt;BR /&gt;
&lt;BR /&gt;
How can i achieve this with EXOS ACL and redirects actions?&lt;BR /&gt;
&lt;BR /&gt;
Regards&lt;BR /&gt;</description>
      <pubDate>Mon, 14 Mar 2016 18:34:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/convert-eos-to-exos-policy-based-routing/m-p/59782#M1716</guid>
      <dc:creator>M_Nees</dc:creator>
      <dc:date>2016-03-14T18:34:00Z</dc:date>
    </item>
    <item>
      <title>RE: Convert EOS to EXOS policy-based Routing</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/convert-eos-to-exos-policy-based-routing/m-p/59783#M1717</link>
      <description>Hi Matthias,&lt;BR /&gt;
&lt;BR /&gt;
You can create a policy file containing the deny and redirect rules.  For example to redirect traffic from a subnet 10.1.0.0/16 to 10.1.1.1, the policy would look like:&lt;BR /&gt;
entry &lt;RULE-NAME&gt; { if { source-address &lt;I&gt;; } then { redirect &lt;I&gt; ; } }entry redirect-rule-1 { if { source-address 10.1.0.0/16 ; } then { redirect 10.1.1.1 ; } }apply this policy to the ingress traffic of a VLAN&lt;BR /&gt;
&lt;BR /&gt;
You can also add additional rules for the sources you wish to deny access:&lt;BR /&gt;
entry deny-rule-1 { if { source-address 192.168.0.1/32 ; } then { deny ; count Deny-1 } }The &lt;B&gt;count&lt;/B&gt; condition on the deny rule is optional, but for troubleshooting purposes can be very helpful in understanding whether the rule is affecting any traffic.&lt;BR /&gt;
&lt;BR /&gt;
You can add multiple sources to a rule and use the &lt;B&gt;Match Any&lt;/B&gt; condition on the rule&lt;BR /&gt;
entry &lt;RULE-NAME&gt; match any { if { source address &lt;I&gt; ; source address &lt;I&gt;} then { deny ; }}I hope this helps&lt;BR /&gt;
&lt;BR /&gt;&lt;/I&gt;&lt;/I&gt;&lt;/RULE-NAME&gt;&lt;/I&gt;&lt;/I&gt;&lt;/RULE-NAME&gt;</description>
      <pubDate>Mon, 14 Mar 2016 19:06:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/convert-eos-to-exos-policy-based-routing/m-p/59783#M1717</guid>
      <dc:creator>Kawawa</dc:creator>
      <dc:date>2016-03-14T19:06:00Z</dc:date>
    </item>
    <item>
      <title>RE: Convert EOS to EXOS policy-based Routing</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/convert-eos-to-exos-policy-based-routing/m-p/59784#M1718</link>
      <description>Hi,  is it possible to negate some of the ACL match-conditions ?&lt;BR /&gt;
Means if NOT source-address is y.y.y.y and destination-adress is x.x.x.x then action ....&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 15 Mar 2016 11:51:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/convert-eos-to-exos-policy-based-routing/m-p/59784#M1718</guid>
      <dc:creator>M_Nees</dc:creator>
      <dc:date>2016-03-15T11:51:00Z</dc:date>
    </item>
    <item>
      <title>RE: Convert EOS to EXOS policy-based Routing</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/convert-eos-to-exos-policy-based-routing/m-p/59785#M1719</link>
      <description>I don't think that is possible, I will ask my colleagues or try a sample ACL and see what it gives</description>
      <pubDate>Tue, 15 Mar 2016 15:21:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/convert-eos-to-exos-policy-based-routing/m-p/59785#M1719</guid>
      <dc:creator>Kawawa</dc:creator>
      <dc:date>2016-03-15T15:21:00Z</dc:date>
    </item>
    <item>
      <title>RE: Convert EOS to EXOS policy-based Routing</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/convert-eos-to-exos-policy-based-routing/m-p/59786#M1720</link>
      <description>Hi Kawawa,&lt;BR /&gt;
&lt;BR /&gt;
Currently there is no option to negate an ACL match-condition. &lt;BR /&gt;
&lt;BR /&gt;
The match-type available is "match all", that means if ALL match-conditions are true then the actions take place.</description>
      <pubDate>Tue, 15 Mar 2016 19:33:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/convert-eos-to-exos-policy-based-routing/m-p/59786#M1720</guid>
      <dc:creator>Henrique</dc:creator>
      <dc:date>2016-03-15T19:33:00Z</dc:date>
    </item>
  </channel>
</rss>

