<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: A little ACL help in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50431#M13539</link>
    <description>Hi Terren,&lt;BR /&gt;
&lt;BR /&gt;
I am not certain problems, but if early permit condition contain deny condition and earlier than the deny condition, that would be permitted. Thus deny first (better all deny condition) more safer.&lt;BR /&gt;
If yet problem, please let us share exactly which packet should be deny/permit with us.</description>
    <pubDate>Wed, 14 Feb 2018 07:23:00 GMT</pubDate>
    <dc:creator>tknv</dc:creator>
    <dc:date>2018-02-14T07:23:00Z</dc:date>
    <item>
      <title>A little ACL help</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50426#M13534</link>
      <description>I'm developing an ACL to allow guest use of certian resources on my network.  In the end, the guest network will be its own subnet.  So, I want to apply this ACL at the VLAN level.  I've got the ACL working at the port level, but when I apply it to the VLAN nothing works...&lt;BR /&gt;
&lt;BR /&gt;
Where might I be messing this up?&lt;BR /&gt;
&lt;BR /&gt;
entry allowswitchcom  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
 source-address 10.0.99.200/32;&lt;BR /&gt;
        }  then  {&lt;BR /&gt;
     permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowswitchcom2  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
        source-address 10.0.99.254/32;&lt;BR /&gt;
        }  then  {&lt;BR /&gt;
     permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry denyswitch  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
 destination-address 10.0.99.200/32;&lt;BR /&gt;
 source-address 10.0.99.0/24;&lt;BR /&gt;
 }  then  {&lt;BR /&gt;
     deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry denyswitch2  {&lt;BR /&gt;
    if {&lt;BR /&gt;
        source-address 10.0.99.0/24;&lt;BR /&gt;
        destination-address 10.0.99.254/32;&lt;BR /&gt;
        }  then  {&lt;BR /&gt;
            deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry denylocalssh  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
        source-address 10.0.99.0/24;&lt;BR /&gt;
        protocol tcp;&lt;BR /&gt;
        destination-port 22;&lt;BR /&gt;
        }  then  {&lt;BR /&gt;
            deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry sshmgmt  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
        destination-address 10.0.99.0/24;&lt;BR /&gt;
        protocol tcp;&lt;BR /&gt;
        destination-port 22;&lt;BR /&gt;
        }  then  {&lt;BR /&gt;
            deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowmakerlab  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     source-address 10.0.99.0/24;&lt;BR /&gt;
  destination-address 10.0.99.0/24;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      permit;}&lt;BR /&gt;
}  &lt;BR /&gt;
&lt;BR /&gt;
entry allowdhcp  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     source-address 0.0.0.0/0;&lt;BR /&gt;
  protocol udp;&lt;BR /&gt;
  destination-port 67-68;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowdns  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     source-address 0.0.0.0/0;&lt;BR /&gt;
  protocol udp;&lt;BR /&gt;
  destination-port 53;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowntp  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     source-address 0.0.0.0/0;&lt;BR /&gt;
  protocol udp;&lt;BR /&gt;
  destination-port 123;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowvncmgmt  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
 source-address 0.0.0.0/0;&lt;BR /&gt;
        protocol tcp;&lt;BR /&gt;
 source-port 5900-5910;&lt;BR /&gt;
        }  then {&lt;BR /&gt;
     permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowwinlogon  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     source-address 10.0.99.0/24;&lt;BR /&gt;
  protocol tcp;&lt;BR /&gt;
  destination-port &amp;gt; 1024;&lt;BR /&gt;
  destination-address 10.0.66.220/32;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
#entry allowprint515  {&lt;BR /&gt;
#    if  {&lt;BR /&gt;
#     destination-address *printerIP/32;&lt;BR /&gt;
#  protocol tcp;&lt;BR /&gt;
#  destination-port 515;&lt;BR /&gt;
#  }  then {&lt;BR /&gt;
#      permit;}&lt;BR /&gt;
#}&lt;BR /&gt;
&lt;BR /&gt;
#entry allowprint631  {&lt;BR /&gt;
#    if  {&lt;BR /&gt;
#     destination-address *printerIP/32;&lt;BR /&gt;
#  protocol tcp;&lt;BR /&gt;
#  destination-port 631;&lt;BR /&gt;
#  }  then {&lt;BR /&gt;
#      permit;}&lt;BR /&gt;
#}&lt;BR /&gt;
&lt;BR /&gt;
#entry allowprint9100  {&lt;BR /&gt;
#    if  {&lt;BR /&gt;
#     destination-address *printerIP/32;&lt;BR /&gt;
#  protocol tcp;&lt;BR /&gt;
#  destination-port 9100;&lt;BR /&gt;
#  }  then {&lt;BR /&gt;
#      permit;}&lt;BR /&gt;
#}&lt;BR /&gt;
&lt;BR /&gt;
entry denyHTTPinternal10 {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     destination-address 10.0.0.0/8;&lt;BR /&gt;
  protocol tcp;&lt;BR /&gt;
  destination-port 80;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry denyHTTPinternal192 {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     destination-address 192.168.0.0/16;&lt;BR /&gt;
  protocol tcp;&lt;BR /&gt;
  destination-port 80;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry denyHTTPinternal172 {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     destination-address 172.16.0.0/12;&lt;BR /&gt;
  protocol tcp;&lt;BR /&gt;
  destination-port 80;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry denyHTTPsinternal10 {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     destination-address 10.0.0.0/8;&lt;BR /&gt;
  protocol tcp;&lt;BR /&gt;
  destination-port 443;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry denyHTTPsinternal192 {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     destination-address 192.168.0.0/16;&lt;BR /&gt;
  protocol tcp;&lt;BR /&gt;
  destination-port 443;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry denyHTTPsinternal172 {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     destination-address 172.16.0.0/12;&lt;BR /&gt;
  protocol tcp;&lt;BR /&gt;
  destination-port 443;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowhttpinternet  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     protocol tcp;&lt;BR /&gt;
  destination-port 80;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowhttpsinternet  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     protocol tcp;&lt;BR /&gt;
  destination-port 443;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry denyall  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
        source-address 0.0.0.0/0;&lt;BR /&gt;
        }  then  {&lt;BR /&gt;
            deny;}&lt;BR /&gt;
}</description>
      <pubDate>Wed, 14 Feb 2018 06:00:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50426#M13534</guid>
      <dc:creator>Terren_Crider</dc:creator>
      <dc:date>2018-02-14T06:00:00Z</dc:date>
    </item>
    <item>
      <title>RE: A little ACL help</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50427#M13535</link>
      <description>Tried to make some code tags... but that didn't work for me, either.</description>
      <pubDate>Wed, 14 Feb 2018 06:03:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50427#M13535</guid>
      <dc:creator>Terren_Crider</dc:creator>
      <dc:date>2018-02-14T06:03:00Z</dc:date>
    </item>
    <item>
      <title>RE: A little ACL help</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50428#M13536</link>
      <description>Maybe in the &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    entry  denyswitch  {&lt;BR /&gt;
      if  {&lt;BR /&gt;
  destination-address 10.0.99.200/32;&lt;BR /&gt;
  source-address 10.0.99.0/24;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      d eny;}&lt;BR /&gt;
  }&lt;BR /&gt;
&lt;BR /&gt;
    There is a space in the “deny” that should not be there?&lt;BR /&gt;
&lt;BR /&gt;
    &lt;I&gt;&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
   &lt;BR /&gt;&lt;/I&gt;</description>
      <pubDate>Wed, 14 Feb 2018 06:23:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50428#M13536</guid>
      <dc:creator>George_Smith1</dc:creator>
      <dc:date>2018-02-14T06:23:00Z</dc:date>
    </item>
    <item>
      <title>RE: A little ACL help</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50429#M13537</link>
      <description>I don't have any undue spaces in the .pol file itself.</description>
      <pubDate>Wed, 14 Feb 2018 06:23:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50429#M13537</guid>
      <dc:creator>Terren_Crider</dc:creator>
      <dc:date>2018-02-14T06:23:00Z</dc:date>
    </item>
    <item>
      <title>RE: A little ACL help</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50430#M13538</link>
      <description>Is it possible to apply an ACL to a VLAN but exclude one port?&lt;BR /&gt;
&lt;BR /&gt;
Edit:  My thought here is that the VLAN in question in my lab setup is also on the uplink port of the switch.</description>
      <pubDate>Wed, 14 Feb 2018 07:10:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50430#M13538</guid>
      <dc:creator>Terren_Crider</dc:creator>
      <dc:date>2018-02-14T07:10:00Z</dc:date>
    </item>
    <item>
      <title>RE: A little ACL help</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50431#M13539</link>
      <description>Hi Terren,&lt;BR /&gt;
&lt;BR /&gt;
I am not certain problems, but if early permit condition contain deny condition and earlier than the deny condition, that would be permitted. Thus deny first (better all deny condition) more safer.&lt;BR /&gt;
If yet problem, please let us share exactly which packet should be deny/permit with us.</description>
      <pubDate>Wed, 14 Feb 2018 07:23:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50431#M13539</guid>
      <dc:creator>tknv</dc:creator>
      <dc:date>2018-02-14T07:23:00Z</dc:date>
    </item>
    <item>
      <title>RE: A little ACL help</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50432#M13540</link>
      <description>I have it working now.  I'm still not sure what was getting blocked, but I added an entry to allow bidirectional traffic to my VLAN.&lt;BR /&gt;
&lt;BR /&gt;
entry allowbidirectional  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
        destination-address 10.0.99.0/24;&lt;BR /&gt;
        }  then  {&lt;BR /&gt;
            permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
This was added as the second to last entry, right above the denyall rule.&lt;BR /&gt;
&lt;BR /&gt;
Edit:  I also changed the order of some things.  Like allowing DNS, DHCP, NTP at the top rather than in the middle.</description>
      <pubDate>Thu, 15 Feb 2018 00:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50432#M13540</guid>
      <dc:creator>Terren_Crider</dc:creator>
      <dc:date>2018-02-15T00:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: A little ACL help</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50433#M13541</link>
      <description>Probably earlier entry blocked it. Can you share whole ACL .pol?&lt;BR /&gt;</description>
      <pubDate>Thu, 15 Feb 2018 00:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50433#M13541</guid>
      <dc:creator>tknv</dc:creator>
      <dc:date>2018-02-15T00:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: A little ACL help</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50434#M13542</link>
      <description>not sure if it applied here, but the difference when using VLAN for ACL is that it applies only to traffic entering the VLAN (not exiting it).&lt;BR /&gt;</description>
      <pubDate>Thu, 15 Feb 2018 00:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50434#M13542</guid>
      <dc:creator>Stephane_Grosj1</dc:creator>
      <dc:date>2018-02-15T00:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: A little ACL help</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50435#M13543</link>
      <description>Here's the current working ACL.  Without the second to last entry "allowbidirectional" it does not work.&lt;BR /&gt;
&lt;BR /&gt;
entry allowDHCP  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     source-address 0.0.0.0/0;&lt;BR /&gt;
  pr otocol udp;&lt;BR /&gt;
  destination-port 67-68;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowDNS {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     source-address 0.0.0.0/0;&lt;BR /&gt;
  protocol udp;&lt;BR /&gt;
  destination-port 53;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowNTP  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     source-address 0.0.0.0/0;&lt;BR /&gt;
  protocol udp;&lt;BR /&gt;
  destination-port 123;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowVNCmgmt  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
  source-address 0.0.0.0/0;&lt;BR /&gt;
        protocol tcp;&lt;BR /&gt;
  source-port 5900-5910;&lt;BR /&gt;
        }  then  {&lt;BR /&gt;
   permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry denylocalSSH  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
        source-address 10.0.99.0/24;&lt;BR /&gt;
        protocol tcp;&lt;BR /&gt;
        destination-port 22;&lt;BR /&gt;
        }  then  {&lt;BR /&gt;
            deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry SSHmgmt  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
        destination-address 10.0.99.0/24;&lt;BR /&gt;
        protocol tcp;&lt;BR /&gt;
        destination-port 22;&lt;BR /&gt;
        }  then  {&lt;BR /&gt;
            permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowNetSightin  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
        source-address 10.0.200.216/32;&lt;BR /&gt;
  destination-address 10.0.99.200/32;&lt;BR /&gt;
        }  then  {&lt;BR /&gt;
            permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowNetSightout  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
        source-address 10.0.99.200/32;&lt;BR /&gt;
  destination-address 10.0.200.216/32;&lt;BR /&gt;
        }  then  {&lt;BR /&gt;
            permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowswitchcom  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
  source-address 10.0.99.200/32;&lt;BR /&gt;
        }  then  {&lt;BR /&gt;
   permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowswitchcom2  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
        source-address 10.0.99.254/32;&lt;BR /&gt;
        }  then  {&lt;BR /&gt;
   permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry denyHTTPswitch  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
  source-address 10.0.99.0/24;&lt;BR /&gt;
  destination-address 10.0.99.200/32;&lt;BR /&gt;
  protocol tcp;&lt;BR /&gt;
  destination-port 80;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
   deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry denyHTTPswitch2  {&lt;BR /&gt;
    if {&lt;BR /&gt;
        source-address 10.0.99.0/24;&lt;BR /&gt;
        destination-address 10.0.99.254/32;&lt;BR /&gt;
  protocol tcp;&lt;BR /&gt;
  destination-port 80;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
            deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowmakerlab  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     source-address 10.0.99.0/24;&lt;BR /&gt;
  destination-address 10.0.99.0/24;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      permit;}&lt;BR /&gt;
}  &lt;BR /&gt;
&lt;BR /&gt;
entry denyICMP  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
        source-address 10.0.99.0/24;&lt;BR /&gt;
        protocol icmp;&lt;BR /&gt;
        }  then  {&lt;BR /&gt;
            deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
#entry allowwinlogon  {&lt;BR /&gt;
#    if  {&lt;BR /&gt;
#     source-address 10.0.99.0/24;&lt;BR /&gt;
#  protocol tcp;&lt;BR /&gt;
#  destination-port &amp;gt; 1024;&lt;BR /&gt;
#  destination-address 10.0.66.220/32;&lt;BR /&gt;
#  }  then  {&lt;BR /&gt;
#      permit;}&lt;BR /&gt;
#}&lt;BR /&gt;
&lt;BR /&gt;
#entry allowprint515  {&lt;BR /&gt;
#    if  {&lt;BR /&gt;
#     destination-address *printerIP/32;&lt;BR /&gt;
#  protocol tcp;&lt;BR /&gt;
#  destination-port 515;&lt;BR /&gt;
#  }  then {&lt;BR /&gt;
#      permit;}&lt;BR /&gt;
#}&lt;BR /&gt;
&lt;BR /&gt;
#entry allowprint631  {&lt;BR /&gt;
#    if  {&lt;BR /&gt;
#     destination-address *printerIP/32;&lt;BR /&gt;
#  protocol tcp;&lt;BR /&gt;
#  destination-port 631;&lt;BR /&gt;
#  }  then {&lt;BR /&gt;
#      permit;}&lt;BR /&gt;
#}&lt;BR /&gt;
&lt;BR /&gt;
#entry allowprint9100  {&lt;BR /&gt;
#    if  {&lt;BR /&gt;
#     destination-address *printerIP/32;&lt;BR /&gt;
#  protocol tcp;&lt;BR /&gt;
#  destination-port 9100;&lt;BR /&gt;
#  }  then {&lt;BR /&gt;
#      permit;}&lt;BR /&gt;
#}&lt;BR /&gt;
&lt;BR /&gt;
entry denyHTTPinternal10 {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     destination-address 10.0.0.0/8;&lt;BR /&gt;
  protocol tcp;&lt;BR /&gt;
  destination-port 80;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry denyHTTPinternal192 {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     destination-address 192.168.0.0/16;&lt;BR /&gt;
  protocol tcp;&lt;BR /&gt;
  destination-port 80;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry denyHTTPinternal172 {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     destination-address 172.16.0.0/12;&lt;BR /&gt;
  protocol tcp;&lt;BR /&gt;
  destination-port 80;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry denyHTTPSinternal10 {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     destination-address 10.0.0.0/8;&lt;BR /&gt;
  protocol tcp;&lt;BR /&gt;
  destination-port 443;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry denyHTTPSinternal192 {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     destination-address 192.168.0.0/16;&lt;BR /&gt;
  protocol tcp;&lt;BR /&gt;
  destination-port 443;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry denyHTTPSinternal172 {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     destination-address 172.16.0.0/12;&lt;BR /&gt;
  protocol tcp;&lt;BR /&gt;
  destination-port 443;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowHTTPinternet  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     protocol tcp;&lt;BR /&gt;
  destination-port 80;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowHTTPSinternet  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
     protocol tcp;&lt;BR /&gt;
  destination-port 443;&lt;BR /&gt;
  }  then  {&lt;BR /&gt;
      permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry allowbidirectional  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
        destination-address 10.0.99.0/24;&lt;BR /&gt;
        }  then  {&lt;BR /&gt;
            permit;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
entry denyall  {&lt;BR /&gt;
    if  {&lt;BR /&gt;
        source-address 0.0.0.0/0;&lt;BR /&gt;
       }  then  {&lt;BR /&gt;
            deny;}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 15 Feb 2018 00:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50435#M13543</guid>
      <dc:creator>Terren_Crider</dc:creator>
      <dc:date>2018-02-15T00:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: A little ACL help</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50436#M13544</link>
      <description>Thank you very much. I think a packet (to/from 10.0.0.0/8) is not match below should be permit. entry denylocalSSH  {  if  {   source-address 10.0.99.0/24;   protocol tcp;   destination-port 22;  }  then  {   deny;} }  entry denyHTTPswitch  {  if  {   source-address 10.0.99.0/24;   destination-address 10.0.99.200/32;   protocol tcp;   destination-port 80;  }  then  {   deny;} }  entry denyHTTPswitch2  {  if {   source-address 10.0.99.0/24;   destination-address 10.0.99.254/32;   protocol tcp;   destination-port 80;  }  then  {   deny;} }  entry denyICMP  {  if  {   source-address 10.0.99.0/24;   protocol icmp;  }  then  {   deny;} }  entry denyHTTPinternal10 {  if  {   destination-address 10.0.0.0/8;   protocol tcp;   destination-port 80;  }  then  {   deny;} }  entry denyHTTPSinternal10 {  if  {   destination-address 10.0.0.0/8;   protocol tcp;   destination-port 443;  }  then  {   deny;} }   Please let me know if my understanding is wrong.&lt;BR /&gt;
Can you share the packet that should be permitted but denied?</description>
      <pubDate>Thu, 15 Feb 2018 00:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/a-little-acl-help/m-p/50436#M13544</guid>
      <dc:creator>tknv</dc:creator>
      <dc:date>2018-02-15T00:11:00Z</dc:date>
    </item>
  </channel>
</rss>

