<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACL operation to stop client vlans routing to each other within a VR though still have access to P2pL inks and access to teh firewall in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/acl-operation-to-stop-client-vlans-routing-to-each-other-within/m-p/82140#M20188</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;are you sure that you mean 192.168.20.0/16? I think it should be /24, otherwise…&amp;nbsp;well…&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Yes, imo this is correct.&lt;/LI&gt;	&lt;LI&gt;I would also block the other way round. With your ACL 192.168.30.0/24 could send packets to 192.168.20.0/24, but the reply packets would be blocked.&amp;nbsp;&lt;/LI&gt;	&lt;LI&gt;This ACL needs to be configured to interface (port or vlan):&amp;nbsp;configure access-list ACLNAME&amp;nbsp;[port|vlan] [ingress|egress]&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Stefan&lt;/P&gt;</description>
    <pubDate>Fri, 18 Dec 2020 18:36:03 GMT</pubDate>
    <dc:creator>Stefan_K_</dc:creator>
    <dc:date>2020-12-18T18:36:03Z</dc:date>
    <item>
      <title>ACL operation to stop client vlans routing to each other within a VR though still have access to P2pL inks and access to teh firewall</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/acl-operation-to-stop-client-vlans-routing-to-each-other-within/m-p/82139#M20187</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a requiremment :&lt;/P&gt;&lt;P&gt;The server vlans with a VR with enable forwarding configured, should not be able to communicate with each other, though as this is&amp;nbsp; VR there are a number of P2p network through the infrastructure , to get this VR to the firewall where , the FW acts as the extrenal router and access to other FW and other Vr’s , and ultimatly the internet , for all the configured vlans within the VR.&lt;/P&gt;&lt;P&gt;&amp;nbsp;MY first though is to create an&amp;nbsp; ACL that is basically for the vlans I do not want to communicate with each other , if the network is not listed in this ACL they should still be able to access each other&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Entry Deny_ VlanA_B {&lt;/P&gt;&lt;P&gt;if{&lt;/P&gt;&lt;P&gt;source-address 192.168.20.0/16;&lt;/P&gt;&lt;P&gt;destination-address 192.168.30.0/24;&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;Then {&lt;/P&gt;&lt;P&gt;deny ;&lt;/P&gt;&lt;P&gt;count Deny_VlanA_B ;&lt;/P&gt;&lt;P&gt;]&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;Of course then add the other client vlans in this VR..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Assuming this is correct , I have no hardware to test untill I get to site ( remotly )&lt;/P&gt;&lt;P&gt;1 . is the proposed acl correct for what I want to achieve ?&lt;/P&gt;&lt;OL type="1" start="2"&gt;&lt;LI&gt;Do I need a return statement ? ie the other way round from B to A&lt;/LI&gt;	&lt;LI&gt;Is this acl added to the VR as configure access-list xxx any ingress&lt;/LI&gt;	&lt;LI&gt;&amp;nbsp;Or is thsi a global ie VR-default command.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2020 18:27:32 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/acl-operation-to-stop-client-vlans-routing-to-each-other-within/m-p/82139#M20187</guid>
      <dc:creator>Rod_Robertson</dc:creator>
      <dc:date>2020-12-18T18:27:32Z</dc:date>
    </item>
    <item>
      <title>Re: ACL operation to stop client vlans routing to each other within a VR though still have access to P2pL inks and access to teh firewall</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/acl-operation-to-stop-client-vlans-routing-to-each-other-within/m-p/82140#M20188</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;are you sure that you mean 192.168.20.0/16? I think it should be /24, otherwise…&amp;nbsp;well…&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Yes, imo this is correct.&lt;/LI&gt;	&lt;LI&gt;I would also block the other way round. With your ACL 192.168.30.0/24 could send packets to 192.168.20.0/24, but the reply packets would be blocked.&amp;nbsp;&lt;/LI&gt;	&lt;LI&gt;This ACL needs to be configured to interface (port or vlan):&amp;nbsp;configure access-list ACLNAME&amp;nbsp;[port|vlan] [ingress|egress]&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Stefan&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2020 18:36:03 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/acl-operation-to-stop-client-vlans-routing-to-each-other-within/m-p/82140#M20188</guid>
      <dc:creator>Stefan_K_</dc:creator>
      <dc:date>2020-12-18T18:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: ACL operation to stop client vlans routing to each other within a VR though still have access to P2pL inks and access to teh firewall</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/acl-operation-to-stop-client-vlans-routing-to-each-other-within/m-p/82141#M20189</link>
      <description>&lt;P&gt;Stefan&lt;/P&gt;&lt;P&gt;oopps yest its a /24 …&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the confirmation , I been doing extreme for a nunber of years , though in the clients I look after acl , like thsi do not normally come about hense the question, thanks for the prompt response..&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2020 19:05:53 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/acl-operation-to-stop-client-vlans-routing-to-each-other-within/m-p/82141#M20189</guid>
      <dc:creator>Rod_Robertson</dc:creator>
      <dc:date>2020-12-18T19:05:53Z</dc:date>
    </item>
  </channel>
</rss>

