<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Basic Policy Based ACL in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43091#M10305</link>
    <description>thank you very much for the solution!&lt;BR /&gt;
That was my typo:&lt;BR /&gt;
I applied the policy like this&lt;BR /&gt;
configure bgp neighbor 2001:db8::1 route-policy in allv6-in&lt;BR /&gt;
and (again!) forgot about address-family ipv6-unicast&lt;BR /&gt;
now it works as expected</description>
    <pubDate>Tue, 25 Apr 2017 14:22:00 GMT</pubDate>
    <dc:creator>Nick_Yakimenko</dc:creator>
    <dc:date>2017-04-25T14:22:00Z</dc:date>
    <item>
      <title>Basic Policy Based ACL</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43078#M10292</link>
      <description>Hi there,&lt;BR /&gt;
Can anyone explain to my why this basic ACL policy does not work?&lt;BR /&gt;
This is using XOS 22.2.15 on an X450-G2.&lt;BR /&gt;
&lt;BR /&gt;
I want to emulate Cisco behaviour of permitting what I want with an deny at the bottom.&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;# Permit&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;entry 1.1 { if { source-address 192.168.132.0/26; destination-address 192.168.249.202/32;} then { permit; count Permit;}}&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;# Deny Everything Else&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;entry 2.1 { if {} then { deny; count Deny;}}&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
The access list is applied to a VLAN as follows:&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;configure access-list Test vlan "Data" ingress&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
It seems to drop all packets, I thought policies were supposed to process top down with packets until they get a match?&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
Mark&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Mon, 24 Apr 2017 20:17:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43078#M10292</guid>
      <dc:creator>Mark_Lamond</dc:creator>
      <dc:date>2017-04-24T20:17:00Z</dc:date>
    </item>
    <item>
      <title>RE: Basic Policy Based ACL</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43079#M10293</link>
      <description>if match any</description>
      <pubDate>Mon, 24 Apr 2017 20:30:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43079#M10293</guid>
      <dc:creator>Nick_Yakimenko</dc:creator>
      <dc:date>2017-04-24T20:30:00Z</dc:date>
    </item>
    <item>
      <title>RE: Basic Policy Based ACL</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43080#M10294</link>
      <description>more about 'match all' or 'match any'&lt;BR /&gt;
&lt;A href="https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-create-and-apply-an-ACL-in-EXOS" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-create-and-apply-an-ACL-in-EXOS&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 24 Apr 2017 20:30:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43080#M10294</guid>
      <dc:creator>Nick_Yakimenko</dc:creator>
      <dc:date>2017-04-24T20:30:00Z</dc:date>
    </item>
    <item>
      <title>RE: Basic Policy Based ACL</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43081#M10295</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
the last ACL, will block  all traffic including ARP, etc. on vlan ingress.&lt;BR /&gt;
You should for example add before the last entry:&lt;BR /&gt;
&lt;BR /&gt;
entry ARP { if match all {    ethernet-type 0x0806 ;&lt;BR /&gt;
} then {&lt;BR /&gt;
    permit  ;&lt;BR /&gt;
} }&lt;BR /&gt;
&lt;BR /&gt;
and  so on...&lt;BR /&gt;
&lt;BR /&gt;
--&lt;BR /&gt;
Jarek</description>
      <pubDate>Mon, 24 Apr 2017 20:40:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43081#M10295</guid>
      <dc:creator>Jarek</dc:creator>
      <dc:date>2017-04-24T20:40:00Z</dc:date>
    </item>
    <item>
      <title>RE: Basic Policy Based ACL</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43082#M10296</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
if you want to emulate an IPv4 router ACL, you should use a deny statement that denies IPv4 packets only:&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;entry 2.1 { if {source-address 0.0.0.0/0;} then { deny; count Deny;}}&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
Otherwise you will have problems with e.g. ARP as mentioned by Jarek.&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
Erik</description>
      <pubDate>Tue, 25 Apr 2017 11:56:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43082#M10296</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2017-04-25T11:56:00Z</dc:date>
    </item>
    <item>
      <title>RE: Basic Policy Based ACL</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43083#M10297</link>
      <description>Thanks for the replies folks, now working as expected and making a lot more sense.&lt;BR /&gt;
&lt;BR /&gt;
We use a lot of ACL's and are moving from Enterasys/Cisco to Extreme so a lot to learn.&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
Mark&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 25 Apr 2017 14:07:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43083#M10297</guid>
      <dc:creator>Mark_Lamond</dc:creator>
      <dc:date>2017-04-25T14:07:00Z</dc:date>
    </item>
    <item>
      <title>RE: Basic Policy Based ACL</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43084#M10298</link>
      <description>Hi Mark,&lt;BR /&gt;
&lt;BR /&gt;
if you need to convert Cisco(-like) ACLs to EXOS you can try the &lt;A href="https://github.com/extremenetworks/ExtremeScripting/tree/master/EXOS/Perl/IOStoEXOSACL" target="_blank" rel="nofollow noreferrer noopener"&gt;IOS to EXOS ACL Convert&lt;/A&gt; Perl script. Simple IPv4 ACLs can be converted with &lt;A href="https://github.com/extremenetworks/E2X" target="_blank" rel="nofollow noreferrer noopener"&gt;E2X&lt;/A&gt; as well.&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
Erik</description>
      <pubDate>Tue, 25 Apr 2017 14:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43084#M10298</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2017-04-25T14:22:00Z</dc:date>
    </item>
    <item>
      <title>RE: Basic Policy Based ACL</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43085#M10299</link>
      <description>I'm trying to make a policy from this cisco line&lt;BR /&gt;
ipv6 prefix-list ipv6_out seq 10 permit 2001:db8::/32 le 48&lt;BR /&gt;
and it does not seem to work:&lt;BR /&gt;
&lt;BR /&gt;
entry acl_prefix-list_1 {   if {&lt;BR /&gt;
   } then {&lt;BR /&gt;
      permit ;&lt;BR /&gt;
   }&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 25 Apr 2017 14:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43085#M10299</guid>
      <dc:creator>Nick_Yakimenko</dc:creator>
      <dc:date>2017-04-25T14:22:00Z</dc:date>
    </item>
    <item>
      <title>RE: Basic Policy Based ACL</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43086#M10300</link>
      <description>Hi Nick,&lt;BR /&gt;
&lt;BR /&gt;
a prefix list is not an access control list...  On EXOS, routing policies use .pol files just like ACLs, but they use different match statements and actions. They even have their own chapter in the documentation, &lt;A href="http://documentation.extremenetworks.com/exos_22.2/EXOS_21_1/Routing_Policies/routing-policies.shtml" target="_blank" rel="nofollow noreferrer noopener"&gt;Routing Policies&lt;/A&gt;.&lt;BR /&gt;
&lt;BR /&gt;
Anyway, the EXOS equivalent to your IOS prefix list line is:&lt;BR /&gt;
entry ipv6_out_05 {   if {     nlri 2001:db8::/49   } then {     deny   } } entry ipv6_out_10 {   if {     nlri 2001:db8::/32   } then {     permit   } }You can use the &lt;I&gt;exact&lt;/I&gt; keyword after the subnet specification to require an exact match, instead of accepting all longer prefixes.&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
Erik</description>
      <pubDate>Tue, 25 Apr 2017 14:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43086#M10300</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2017-04-25T14:22:00Z</dc:date>
    </item>
    <item>
      <title>RE: Basic Policy Based ACL</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43087#M10301</link>
      <description>Thanks for reply&lt;BR /&gt;
What about this one?&lt;BR /&gt;
&lt;BR /&gt;
ipv6 prefix-list allv6 seq 10 permit ::/0 ge 20 le 48 &lt;BR /&gt;
&lt;BR /&gt;
the eqivalent to v4 we use is&lt;BR /&gt;
&lt;BR /&gt;
ip prefix-list all seq 10 permit 0.0.0.0/0 ge 8 le 24&lt;BR /&gt;
extreme-style is&lt;BR /&gt;
&lt;BR /&gt;
entry bgp-min24-00 {                                                            &lt;BR /&gt;
if match any {                                                                  &lt;BR /&gt;
        nlri any/9 exact ;                                                      &lt;BR /&gt;
        nlri any/10 exact ;                                                     &lt;BR /&gt;
        nlri any/11 exact ;                                                     &lt;BR /&gt;
        nlri any/12 exact ;                                                     &lt;BR /&gt;
        nlri any/13 exact ;                                                     &lt;BR /&gt;
        nlri any/14 exact ;                                                     &lt;BR /&gt;
        nlri any/15 exact ;                                                     &lt;BR /&gt;
        nlri any/16 exact ;                                                     &lt;BR /&gt;
        nlri any/17 exact ;                                                     &lt;BR /&gt;
        nlri any/18 exact ;                                                     &lt;BR /&gt;
        nlri any/19 exact ;                                                     &lt;BR /&gt;
        nlri any/20 exact ;                                                     &lt;BR /&gt;
        nlri any/21 exact ;                                                     &lt;BR /&gt;
        nlri any/22 exact ;                                                     &lt;BR /&gt;
        nlri any/23 exact ;                                                     &lt;BR /&gt;
        nlri any/24 exact ;                                                     &lt;BR /&gt;
        }                                                                       &lt;BR /&gt;
then {                                                                          &lt;BR /&gt;
        local-preference 130 ;                                                  &lt;BR /&gt;
        community add "65535:65535" ;                                           &lt;BR /&gt;
        permit ;                                                                &lt;BR /&gt;
        }                                                                       &lt;BR /&gt;
}                                                                               &lt;BR /&gt;
                                                                                &lt;BR /&gt;
entry bgp-min24-01 {                                                            &lt;BR /&gt;
if match any {                                                                  &lt;BR /&gt;
        nlri any/1 exact;                                                       &lt;BR /&gt;
        nlri any/2 exact;                                                       &lt;BR /&gt;
        nlri any/3 exact;                                                       &lt;BR /&gt;
        nlri any/4 exact;                                                       &lt;BR /&gt;
        nlri any/5 exact;                                                       &lt;BR /&gt;
        nlri any/6 exact;                                                       &lt;BR /&gt;
        nlri any/7 exact;                                                       &lt;BR /&gt;
        nlri any/8 exact;                                                       &lt;BR /&gt;
        nlri any/25 exact ;                                                     &lt;BR /&gt;
        nlri any/26 exact ;                                                     &lt;BR /&gt;
        nlri any/27 exact ;                                                     &lt;BR /&gt;
        nlri any/28 exact ;                                                     &lt;BR /&gt;
        nlri any/29 exact ;                                                     &lt;BR /&gt;
        nlri any/30 exact ;                                                     &lt;BR /&gt;
        nlri any/31 exact ;                                                     &lt;BR /&gt;
        nlri any/32 exact ;                                                     &lt;BR /&gt;
        }                                                                       &lt;BR /&gt;
then {                                                                          &lt;BR /&gt;
        deny ;                                                                  &lt;BR /&gt;
        }                                                                       &lt;BR /&gt;
}                                          &lt;BR /&gt;</description>
      <pubDate>Tue, 25 Apr 2017 14:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43087#M10301</guid>
      <dc:creator>Nick_Yakimenko</dc:creator>
      <dc:date>2017-04-25T14:22:00Z</dc:date>
    </item>
    <item>
      <title>RE: Basic Policy Based ACL</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43088#M10302</link>
      <description>Hi Nick,&lt;BR /&gt;
&lt;BR /&gt;
first a disclaimer: I did not test that my routing policies above really work...&lt;BR /&gt;
&lt;BR /&gt;
My understanding is that "nlri any/X" without "exact" matches on any network with a prefix length of X or longer. Thus you can compose the policy to first deny the too-long prefixes, then allow the accepted prefix length range, and then deny anything not yet matched.&lt;BR /&gt;
&lt;BR /&gt;
Example:&lt;BR /&gt;
entry all_ipv6_05 {   if {     nlri any/49   } then {     deny   } } entry all_ipv6_10 {   if {     nlri any/20   } then {     permit   } } entry ipv6_out_15 {   if {     nlri any/0   } then {     permit   } } That method should work for IPv4 as well.&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
Erik&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 25 Apr 2017 14:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43088#M10302</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2017-04-25T14:22:00Z</dc:date>
    </item>
    <item>
      <title>RE: Basic Policy Based ACL</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43089#M10303</link>
      <description>That is a very good idea, but it does not work as expected&lt;BR /&gt;
Line 3 : Failed argument value 49 is invalid&lt;BR /&gt;
First of all, first argument should be &lt;BR /&gt;
nlri any-ipv6/49&lt;BR /&gt;
Secondly, I tried to filter-out a /48 announces from uplink, so I modified first argument to a /47&lt;BR /&gt;
Did a policy-refresh&lt;BR /&gt;
Tried to disable and then re-enable the bgp-session, but still I can see /48 announcements from an uplink.</description>
      <pubDate>Tue, 25 Apr 2017 14:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43089#M10303</guid>
      <dc:creator>Nick_Yakimenko</dc:creator>
      <dc:date>2017-04-25T14:22:00Z</dc:date>
    </item>
    <item>
      <title>RE: Basic Policy Based ACL</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43090#M10304</link>
      <description>Thanks for testing. Sorry that it did not work. </description>
      <pubDate>Tue, 25 Apr 2017 14:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43090#M10304</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2017-04-25T14:22:00Z</dc:date>
    </item>
    <item>
      <title>RE: Basic Policy Based ACL</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43091#M10305</link>
      <description>thank you very much for the solution!&lt;BR /&gt;
That was my typo:&lt;BR /&gt;
I applied the policy like this&lt;BR /&gt;
configure bgp neighbor 2001:db8::1 route-policy in allv6-in&lt;BR /&gt;
and (again!) forgot about address-family ipv6-unicast&lt;BR /&gt;
now it works as expected</description>
      <pubDate>Tue, 25 Apr 2017 14:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43091#M10305</guid>
      <dc:creator>Nick_Yakimenko</dc:creator>
      <dc:date>2017-04-25T14:22:00Z</dc:date>
    </item>
    <item>
      <title>RE: Basic Policy Based ACL</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43092#M10306</link>
      <description>Great that it works!&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
Erik</description>
      <pubDate>Tue, 25 Apr 2017 14:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/basic-policy-based-acl/m-p/43092#M10306</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2017-04-25T14:22:00Z</dc:date>
    </item>
  </channel>
</rss>

