<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: EXOS ACL on VLAN Problem in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-on-vlan-problem/m-p/70930#M18826</link>
    <description>&lt;P&gt;I haven't personally worked with those policies, however two things come to mind:&lt;/P&gt; &lt;P&gt;1) VLANxxx is considered the interface. So if you want for example to deny traffic from V20-&amp;gt;V10 then you have to put a rule denying src:192.168.2.x,dst:192.168.1.x on VLAN0020 ingress, or VLAN0010 egress. Think of ingress as the traffic coming from the cable into the port, only that in this case the port is the virtual VLAN port inside the switch/router.&lt;/P&gt; &lt;P&gt;2) These devices are not stateful firewalls, they are routers. These ACLs work just like that. They don't look at who initiated a communication in order to let a response pass. They just pass/deny exactly what you tell them, and in the direction you indicate, nothing more, nothing less.&lt;/P&gt;</description>
    <pubDate>Mon, 30 Mar 2020 08:03:26 GMT</pubDate>
    <dc:creator>jeronimo</dc:creator>
    <dc:date>2020-03-30T08:03:26Z</dc:date>
    <item>
      <title>EXOS ACL on VLAN Problem</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-on-vlan-problem/m-p/70929#M18825</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt; &lt;P&gt;I am having a problem with my EXOS ACL Policy.&lt;/P&gt; &lt;P&gt;I have 2 VLANs (for lab purposes):&lt;/P&gt; &lt;P&gt;-VLAN 10 - 192.168.1.0/24&lt;/P&gt; &lt;P&gt;-VLAN 20- 192.168.2.0/24.&lt;/P&gt; &lt;HR /&gt;&lt;P&gt;&lt;STRONG&gt;Objectives:&lt;/STRONG&gt;&lt;/P&gt; &lt;P&gt;-&lt;EM&gt;VLAN 10&lt;/EM&gt; to deny all traffic coming from &lt;EM&gt;VLAN 20&lt;/EM&gt;&lt;/P&gt; &lt;P&gt;-&lt;EM&gt;VLAN 20&lt;/EM&gt;&amp;nbsp; to accept all traffic coming from &lt;EM&gt;VLAN 10&lt;/EM&gt;&lt;/P&gt; &lt;P&gt;&lt;EM&gt;-VLAN 10&amp;nbsp; &lt;/EM&gt;to deny only &lt;STRONG&gt;1&lt;/STRONG&gt; IP from &lt;EM&gt;VLAN 20&lt;/EM&gt;&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;Here is my topology, I am using a router to act as host, since I do not have any host on my GNS3 lab&lt;/P&gt; &lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="60cf2cf050f34b4fb3dcc1e01e1f3848_71e4f7b0-e8a2-46cc-9e39-0a58b062e2b6.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/1914iAF7EFB1C4BA95BD5/image-size/large?v=v2&amp;amp;px=999" role="button" title="60cf2cf050f34b4fb3dcc1e01e1f3848_71e4f7b0-e8a2-46cc-9e39-0a58b062e2b6.png" alt="60cf2cf050f34b4fb3dcc1e01e1f3848_71e4f7b0-e8a2-46cc-9e39-0a58b062e2b6.png" /&gt;&lt;/span&gt;&lt;FIGCAPTION&gt;Topology&lt;/FIGCAPTION&gt;&lt;/FIGURE&gt;&lt;HR /&gt;&lt;P&gt;&lt;STRONG&gt;Policy created:&lt;/STRONG&gt;&lt;/P&gt; &lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="60cf2cf050f34b4fb3dcc1e01e1f3848_1e5543c9-5435-4acd-915a-dce66188570a.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2065iF848B6EC942EC1A2/image-size/large?v=v2&amp;amp;px=999" role="button" title="60cf2cf050f34b4fb3dcc1e01e1f3848_1e5543c9-5435-4acd-915a-dce66188570a.png" alt="60cf2cf050f34b4fb3dcc1e01e1f3848_1e5543c9-5435-4acd-915a-dce66188570a.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;entry one {&lt;BR /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; if match all {&lt;BR /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source-address 192.168.2.0/24 ;&lt;BR /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-address 192.168.1.0/24 ;&lt;BR /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; } then {&lt;BR /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; count test ;&lt;BR /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; deny ;&lt;BR /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;BR /&gt; }&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;HR /&gt;&lt;P&gt;Scenario 1:&lt;/P&gt; &lt;P&gt;&lt;STRONG&gt;Objectives:&lt;/STRONG&gt;&lt;/P&gt; &lt;P&gt;-&lt;EM&gt;VLAN 10&lt;/EM&gt; to deny all traffic coming from &lt;EM&gt;VLAN 20 (not working)&lt;/EM&gt;&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;&lt;STRONG&gt;Scenario:&lt;/STRONG&gt;&lt;/P&gt; &lt;UL&gt;&lt;LI&gt;I apply the policy to &lt;EM&gt;vlan10&lt;/EM&gt; ingress direction, but both router from &lt;EM&gt;vlan20&lt;/EM&gt; can still ping 192.168.1.2 router.&lt;/LI&gt; &lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="60cf2cf050f34b4fb3dcc1e01e1f3848_0ccfcb6e-0def-480e-b173-c79cba0db0b1.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/467i43B910C347FFBF51/image-size/large?v=v2&amp;amp;px=999" role="button" title="60cf2cf050f34b4fb3dcc1e01e1f3848_0ccfcb6e-0def-480e-b173-c79cba0db0b1.png" alt="60cf2cf050f34b4fb3dcc1e01e1f3848_0ccfcb6e-0def-480e-b173-c79cba0db0b1.png" /&gt;&lt;/span&gt;&lt;FIGCAPTION&gt;Extreme Policy&lt;/FIGCAPTION&gt;&lt;/FIGURE&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="60cf2cf050f34b4fb3dcc1e01e1f3848_2ca3d96b-7dd9-45a5-b1fd-76becbdc287c.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2234i1B1644E9DB281194/image-size/large?v=v2&amp;amp;px=999" role="button" title="60cf2cf050f34b4fb3dcc1e01e1f3848_2ca3d96b-7dd9-45a5-b1fd-76becbdc287c.png" alt="60cf2cf050f34b4fb3dcc1e01e1f3848_2ca3d96b-7dd9-45a5-b1fd-76becbdc287c.png" /&gt;&lt;/span&gt;&lt;FIGCAPTION&gt;Router 2.2&lt;/FIGCAPTION&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="60cf2cf050f34b4fb3dcc1e01e1f3848_c1995dee-f032-4f99-b8c4-7ff547c73d2c.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/1547i08382A852EDC5073/image-size/large?v=v2&amp;amp;px=999" role="button" title="60cf2cf050f34b4fb3dcc1e01e1f3848_c1995dee-f032-4f99-b8c4-7ff547c73d2c.png" alt="60cf2cf050f34b4fb3dcc1e01e1f3848_c1995dee-f032-4f99-b8c4-7ff547c73d2c.png" /&gt;&lt;/span&gt;&lt;FIGCAPTION&gt;Router 2.3&lt;/FIGCAPTION&gt;&lt;/FIGURE&gt;&lt;HR /&gt;&lt;P&gt;Scenario 2:&lt;/P&gt; &lt;P&gt;&lt;STRONG&gt;Objectives:&lt;/STRONG&gt;&lt;/P&gt; &lt;P&gt;-&lt;EM&gt;VLAN 10&lt;/EM&gt; to deny all traffic coming from &lt;EM&gt;VLAN 20 (working)&lt;/EM&gt;&lt;/P&gt; &lt;P&gt;&lt;EM&gt;-VLAN 20&amp;nbsp; &lt;/EM&gt;to allow all traffic coming from &lt;EM&gt;VLAN 10 (not working)&lt;/EM&gt;&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;&lt;STRONG&gt;Scenario:&lt;/STRONG&gt;&lt;/P&gt; &lt;UL&gt;&lt;LI&gt;I apply the policy to &lt;EM&gt;vlan20&lt;/EM&gt; ingress direction, and the ping was block, the problem now is &lt;EM&gt;vlan10&lt;/EM&gt; cannot ping &lt;EM&gt;vlan20 &lt;/EM&gt;(even if I made a wildcard rule policy on the end.)&lt;/LI&gt; &lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="60cf2cf050f34b4fb3dcc1e01e1f3848_f0377a54-9577-4224-9fe9-a86e357e02d0.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/3690i1BDA03FC09D3CFD5/image-size/large?v=v2&amp;amp;px=999" role="button" title="60cf2cf050f34b4fb3dcc1e01e1f3848_f0377a54-9577-4224-9fe9-a86e357e02d0.png" alt="60cf2cf050f34b4fb3dcc1e01e1f3848_f0377a54-9577-4224-9fe9-a86e357e02d0.png" /&gt;&lt;/span&gt;&lt;FIGCAPTION&gt;ACL workaround 2&lt;/FIGCAPTION&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="60cf2cf050f34b4fb3dcc1e01e1f3848_09432405-e5be-4f12-a4f4-6b2b5156e2fb.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/1924i7B7D583134E9A928/image-size/large?v=v2&amp;amp;px=999" role="button" title="60cf2cf050f34b4fb3dcc1e01e1f3848_09432405-e5be-4f12-a4f4-6b2b5156e2fb.png" alt="60cf2cf050f34b4fb3dcc1e01e1f3848_09432405-e5be-4f12-a4f4-6b2b5156e2fb.png" /&gt;&lt;/span&gt;&lt;FIGCAPTION&gt;Extreme Policy&lt;/FIGCAPTION&gt;&lt;/FIGURE&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="60cf2cf050f34b4fb3dcc1e01e1f3848_86f77b9e-5b0c-45c7-9c43-5b998eccdce2.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/6076i1189C07E307728D5/image-size/large?v=v2&amp;amp;px=999" role="button" title="60cf2cf050f34b4fb3dcc1e01e1f3848_86f77b9e-5b0c-45c7-9c43-5b998eccdce2.png" alt="60cf2cf050f34b4fb3dcc1e01e1f3848_86f77b9e-5b0c-45c7-9c43-5b998eccdce2.png" /&gt;&lt;/span&gt;&lt;FIGCAPTION&gt;vlan 2 to vlan 1&lt;/FIGCAPTION&gt;&lt;/FIGURE&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="60cf2cf050f34b4fb3dcc1e01e1f3848_9f7219e0-4692-4b69-a827-98d3bd320b5e.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2545i98EE519EDD13036B/image-size/large?v=v2&amp;amp;px=999" role="button" title="60cf2cf050f34b4fb3dcc1e01e1f3848_9f7219e0-4692-4b69-a827-98d3bd320b5e.png" alt="60cf2cf050f34b4fb3dcc1e01e1f3848_9f7219e0-4692-4b69-a827-98d3bd320b5e.png" /&gt;&lt;/span&gt;&lt;FIGCAPTION&gt;vlan 1 to vlan 2&lt;/FIGCAPTION&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;HR /&gt;&lt;P&gt;Scenario 3:&lt;/P&gt; &lt;P&gt;&lt;STRONG&gt;Objectives:&lt;/STRONG&gt;&lt;/P&gt; &lt;P&gt;&lt;EM&gt;-VLAN 10&amp;nbsp; &lt;/EM&gt;to deny only &lt;STRONG&gt;1&lt;/STRONG&gt; IP from &lt;EM&gt;VLAN 20&lt;/EM&gt;&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;&lt;STRONG&gt;Scenario:&lt;/STRONG&gt;&lt;/P&gt; &lt;UL&gt;&lt;LI&gt;I apply the policy to &lt;EM&gt;vlan20&lt;/EM&gt; ingress direction.&lt;/LI&gt; &lt;LI&gt;&lt;EM&gt;vlan10 &lt;/EM&gt;blocking the whole &lt;EM&gt;vlan20&lt;/EM&gt; subnet&lt;/LI&gt; &lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="60cf2cf050f34b4fb3dcc1e01e1f3848_0ffac3ea-ebdd-4f62-afa5-9b85110cefda.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/3691iFBF511D29B44B443/image-size/large?v=v2&amp;amp;px=999" role="button" title="60cf2cf050f34b4fb3dcc1e01e1f3848_0ffac3ea-ebdd-4f62-afa5-9b85110cefda.png" alt="60cf2cf050f34b4fb3dcc1e01e1f3848_0ffac3ea-ebdd-4f62-afa5-9b85110cefda.png" /&gt;&lt;/span&gt;&lt;FIGCAPTION&gt;Policy&lt;/FIGCAPTION&gt;&lt;/FIGURE&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="60cf2cf050f34b4fb3dcc1e01e1f3848_86f77b9e-5b0c-45c7-9c43-5b998eccdce2.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/6076i1189C07E307728D5/image-size/large?v=v2&amp;amp;px=999" role="button" title="60cf2cf050f34b4fb3dcc1e01e1f3848_86f77b9e-5b0c-45c7-9c43-5b998eccdce2.png" alt="60cf2cf050f34b4fb3dcc1e01e1f3848_86f77b9e-5b0c-45c7-9c43-5b998eccdce2.png" /&gt;&lt;/span&gt;&lt;FIGCAPTION&gt;Router 2.2 (working)&lt;/FIGCAPTION&gt;&lt;/FIGURE&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="60cf2cf050f34b4fb3dcc1e01e1f3848_2ca3d96b-7dd9-45a5-b1fd-76becbdc287c.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2234i1B1644E9DB281194/image-size/large?v=v2&amp;amp;px=999" role="button" title="60cf2cf050f34b4fb3dcc1e01e1f3848_2ca3d96b-7dd9-45a5-b1fd-76becbdc287c.png" alt="60cf2cf050f34b4fb3dcc1e01e1f3848_2ca3d96b-7dd9-45a5-b1fd-76becbdc287c.png" /&gt;&lt;/span&gt;&lt;FIGCAPTION&gt;Router 2.3 (not working)&lt;/FIGCAPTION&gt;&lt;/FIGURE&gt;&lt;P&gt;Please help me out on this thread. TAC recommendation is to apply the policy on both vlan which I already did. Extreme ACL is quite complicated for me. even tho I have background in programming, seems that extreme is having different perspective in applying ACL policy.&lt;/P&gt;</description>
      <pubDate>Sun, 29 Mar 2020 21:34:41 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-on-vlan-problem/m-p/70929#M18825</guid>
      <dc:creator>Patrick19</dc:creator>
      <dc:date>2020-03-29T21:34:41Z</dc:date>
    </item>
    <item>
      <title>Re: EXOS ACL on VLAN Problem</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-on-vlan-problem/m-p/70930#M18826</link>
      <description>&lt;P&gt;I haven't personally worked with those policies, however two things come to mind:&lt;/P&gt; &lt;P&gt;1) VLANxxx is considered the interface. So if you want for example to deny traffic from V20-&amp;gt;V10 then you have to put a rule denying src:192.168.2.x,dst:192.168.1.x on VLAN0020 ingress, or VLAN0010 egress. Think of ingress as the traffic coming from the cable into the port, only that in this case the port is the virtual VLAN port inside the switch/router.&lt;/P&gt; &lt;P&gt;2) These devices are not stateful firewalls, they are routers. These ACLs work just like that. They don't look at who initiated a communication in order to let a response pass. They just pass/deny exactly what you tell them, and in the direction you indicate, nothing more, nothing less.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2020 08:03:26 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-on-vlan-problem/m-p/70930#M18826</guid>
      <dc:creator>jeronimo</dc:creator>
      <dc:date>2020-03-30T08:03:26Z</dc:date>
    </item>
    <item>
      <title>Re: EXOS ACL on VLAN Problem</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-on-vlan-problem/m-p/70931#M18827</link>
      <description>&lt;P&gt;This is good information i understood well thanks&amp;nbsp;&lt;/P&gt;  &lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2020 15:41:59 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-on-vlan-problem/m-p/70931#M18827</guid>
      <dc:creator>stephenjohn</dc:creator>
      <dc:date>2020-07-17T15:41:59Z</dc:date>
    </item>
  </channel>
</rss>

