<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using ACL to isolate all VLAN, only certain VLAN are allow to communicate. in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/using-acl-to-isolate-all-vlan-only-certain-vlan-are-allow-to/m-p/21998#M1728</link>
    <description>Hi All,&lt;BR /&gt;
&lt;BR /&gt;
I have an situation, the requirement need us to isolate all VLAN, only allow certain VLAN communicate with each other. However, all VLAN shall able to go Internet.&lt;BR /&gt;
&lt;BR /&gt;
The challenge is there are OSPF in the network.&lt;BR /&gt;
Besides, there area VRRP configured in each of the ospf area, I hope it will not affected by ACL.&lt;BR /&gt;
&lt;BR /&gt;
ospf area A         ospf area B        ospf area C&lt;BR /&gt;
-------------------------------------------------------------&lt;BR /&gt;
  Vlan1A                Vlan1B                Vlan1C&lt;BR /&gt;
  Vlan2A                Vlan2B                Vlan2C&lt;BR /&gt;
  Vlan3A                Vlan3B                Vlan3C&lt;BR /&gt;
  Vlan4A                Vlan4B                Vlan4C&lt;BR /&gt;
  Vlan_p2p_A        Vlan_p2p_B        Vlan_p2p_C&lt;BR /&gt;
  Vlan_Internet&lt;BR /&gt;
&lt;BR /&gt;
* Different ospf area have different segment. Hence, there are 12 vlan + 1 vlan_internet&lt;BR /&gt;
* Vlan_p2p are point-to-point type to establish ospf routing table&lt;BR /&gt;
* All Vlan shall be isolated. However, they need communicate with Vlan_Internet inorder to go Internet&lt;BR /&gt;
* Vlan1 are only allow to communicate with Vlan1 in other ospf area, same goes Vlan2, 3 and 4.&lt;BR /&gt;
&lt;BR /&gt;
My idea on how to create ACL:&lt;BR /&gt;
* Create 3 different deny ACL (denyICMP, denyTCP, denyUDP) then apply to Vlan1, 2, 3 and 4 in all 3 area. (Lowest priority) &lt;BR /&gt;
* Create 12 different permit ACL (permitVLAN1A, permitVLAN1B, permitVLAN1C, permitVLAN2A, permitVLAN2B .....) and apply to respective Vlan.&lt;BR /&gt;
* Create permit ACL (Vlan_Internet) and apply to all Vlan&lt;BR /&gt;
&lt;BR /&gt;
I am not sure is this the way to configure ACL. It doesn't sound practical to me, in real environment there are 4 ospf area and each area have 13 Vlan. End up there will hundred of ACL rule in each switch. If I applied that much of ACL in each switch, I believe it will burden the CPU and might increase the latency.&lt;BR /&gt;
&lt;BR /&gt;
I know there are another method called private Vlan, but this network already deployed and is too late for us to make changes.&lt;BR /&gt;
&lt;BR /&gt;
Please advise is I am doing it correctly or there should be another way to do it.&lt;BR /&gt;
&lt;BR /&gt;
Thanks.&lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Wed, 29 Oct 2014 20:33:00 GMT</pubDate>
    <dc:creator>Edward</dc:creator>
    <dc:date>2014-10-29T20:33:00Z</dc:date>
    <item>
      <title>Using ACL to isolate all VLAN, only certain VLAN are allow to communicate.</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/using-acl-to-isolate-all-vlan-only-certain-vlan-are-allow-to/m-p/21998#M1728</link>
      <description>Hi All,&lt;BR /&gt;
&lt;BR /&gt;
I have an situation, the requirement need us to isolate all VLAN, only allow certain VLAN communicate with each other. However, all VLAN shall able to go Internet.&lt;BR /&gt;
&lt;BR /&gt;
The challenge is there are OSPF in the network.&lt;BR /&gt;
Besides, there area VRRP configured in each of the ospf area, I hope it will not affected by ACL.&lt;BR /&gt;
&lt;BR /&gt;
ospf area A         ospf area B        ospf area C&lt;BR /&gt;
-------------------------------------------------------------&lt;BR /&gt;
  Vlan1A                Vlan1B                Vlan1C&lt;BR /&gt;
  Vlan2A                Vlan2B                Vlan2C&lt;BR /&gt;
  Vlan3A                Vlan3B                Vlan3C&lt;BR /&gt;
  Vlan4A                Vlan4B                Vlan4C&lt;BR /&gt;
  Vlan_p2p_A        Vlan_p2p_B        Vlan_p2p_C&lt;BR /&gt;
  Vlan_Internet&lt;BR /&gt;
&lt;BR /&gt;
* Different ospf area have different segment. Hence, there are 12 vlan + 1 vlan_internet&lt;BR /&gt;
* Vlan_p2p are point-to-point type to establish ospf routing table&lt;BR /&gt;
* All Vlan shall be isolated. However, they need communicate with Vlan_Internet inorder to go Internet&lt;BR /&gt;
* Vlan1 are only allow to communicate with Vlan1 in other ospf area, same goes Vlan2, 3 and 4.&lt;BR /&gt;
&lt;BR /&gt;
My idea on how to create ACL:&lt;BR /&gt;
* Create 3 different deny ACL (denyICMP, denyTCP, denyUDP) then apply to Vlan1, 2, 3 and 4 in all 3 area. (Lowest priority) &lt;BR /&gt;
* Create 12 different permit ACL (permitVLAN1A, permitVLAN1B, permitVLAN1C, permitVLAN2A, permitVLAN2B .....) and apply to respective Vlan.&lt;BR /&gt;
* Create permit ACL (Vlan_Internet) and apply to all Vlan&lt;BR /&gt;
&lt;BR /&gt;
I am not sure is this the way to configure ACL. It doesn't sound practical to me, in real environment there are 4 ospf area and each area have 13 Vlan. End up there will hundred of ACL rule in each switch. If I applied that much of ACL in each switch, I believe it will burden the CPU and might increase the latency.&lt;BR /&gt;
&lt;BR /&gt;
I know there are another method called private Vlan, but this network already deployed and is too late for us to make changes.&lt;BR /&gt;
&lt;BR /&gt;
Please advise is I am doing it correctly or there should be another way to do it.&lt;BR /&gt;
&lt;BR /&gt;
Thanks.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 29 Oct 2014 20:33:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/using-acl-to-isolate-all-vlan-only-certain-vlan-are-allow-to/m-p/21998#M1728</guid>
      <dc:creator>Edward</dc:creator>
      <dc:date>2014-10-29T20:33:00Z</dc:date>
    </item>
    <item>
      <title>RE: Using ACL to isolate all VLAN, only certain VLAN are allow to communicate.</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/using-acl-to-isolate-all-vlan-only-certain-vlan-are-allow-to/m-p/21999#M1729</link>
      <description>I believe your requirement is easily achieved using stateful inspection firewalls.&lt;BR /&gt;
But I doubt exos acl doesnt do this.&lt;BR /&gt;
in exos If you add an acl to block on one vlan that will block traffic both ways.[its normal acl not stateful]&lt;BR /&gt;
So thats why switches have private vlan concept.&lt;BR /&gt;
same applies to other vendor switches as well.</description>
      <pubDate>Fri, 31 Oct 2014 23:23:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/using-acl-to-isolate-all-vlan-only-certain-vlan-are-allow-to/m-p/21999#M1729</guid>
      <dc:creator>PARTHIBAN_CHINN</dc:creator>
      <dc:date>2014-10-31T23:23:00Z</dc:date>
    </item>
  </channel>
</rss>

