<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: EXOS dynamic ACL on VLAN not working. in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-dynamic-acl-on-vlan-not-working/m-p/86116#M20665</link>
    <description>Ingress and egress can be confusing, especially with VLANs. Ingress to a VLAN means packets coming in on a port that is a member of that VLAN, tagged or not. I honestly don't know if a packet that is being routed from another VLAN and then passes a certain VLAN is actually considered as ingressing that VLAN, but I don't think so as it is actually rather egressing the port and hence it is considered egressing the VLAN.&lt;BR /&gt;
&lt;BR /&gt;
It should be fairly simple to find out by applying your policy on ingress on some other VLAN that is supposed to be blocked by the policy.&lt;BR /&gt;
&lt;BR /&gt;
/Fredrik</description>
    <pubDate>Thu, 26 Sep 2019 19:29:16 GMT</pubDate>
    <dc:creator>FredrikB</dc:creator>
    <dc:date>2019-09-26T19:29:16Z</dc:date>
    <item>
      <title>EXOS dynamic ACL on VLAN not working.</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-dynamic-acl-on-vlan-not-working/m-p/86112#M20661</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
I want to permit selected subnets and deny all other subnets ingress traffic to our PBX vlan. I configured ACLs shown below. But I can still access to PBX VLAN (web pages of IP phones on PBX VLAN) from every where. What shoul be the problem?&lt;BR /&gt;
&lt;BR /&gt;
PBX VLANs ip subnet is 10.150.101.0/24&lt;BR /&gt;
&lt;BR /&gt;
Regards&lt;BR /&gt;
&lt;BR /&gt;
Rahman&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;create access-list santral-pbx-010 " source-address 10.242.2.0/24 ; destination-address 10.150.101.0/24 ;" " permit ;" application "Cli"&lt;BR /&gt;create access-list santral-pbx-020 " source-address 192.168.10.0/24 ; destination-address 10.150.101.0/24 ;" " permit ;" application "Cli"&lt;BR /&gt;create access-list santral-pbx-030 " source-address 192.168.1.44/32 ; destination-address 10.150.101.0/24 ;" " permit ;" application "Cli"&lt;BR /&gt;create access-list santral-pbx-040 " source-address 192.168.1.183/32 ; destination-address 10.150.101.0/24 ;" " permit ;" application "Cli"&lt;BR /&gt;create access-list santral-pbx-050 " source-address 10.50.0.0/24 ; destination-address 10.150.101.0/24 ;" " permit ;" application "Cli"&lt;BR /&gt;create access-list santral-pbx-060 " source-address 10.110.101.0/24 ; destination-address 10.150.101.0/24 ;" " permit ;" application "Cli"&lt;BR /&gt;create access-list santral-pbx-070 " source-address 10.120.101.0/24 ; destination-address 10.150.101.0/24 ;" " permit ;" application "Cli"&lt;BR /&gt;create access-list santral-pbx-080 " source-address 10.130.101.0/24 ; destination-address 10.150.101.0/24 ;" " permit ;" application "Cli"&lt;BR /&gt;create access-list santral-pbx-090 " source-address 10.141.26.0/24 ; destination-address 10.150.101.0/24 ;" " permit ;" application "Cli"&lt;BR /&gt;create access-list santral-pbx-100 " source-address 10.146.101.0/24 ; destination-address 10.150.101.0/24 ;" " permit ;" application "Cli"&lt;BR /&gt;create access-list santral-pbx-110 " source-address 10.150.101.0/24 ; destination-address 10.150.101.0/24 ;" " permit ;" application "Cli"&lt;BR /&gt;create access-list santral-pbx-120 " source-address 10.160.101.0/24 ; destination-address 10.150.101.0/24 ;" " permit ;" application "Cli"&lt;BR /&gt;create access-list santral-pbx-130 " source-address 10.111.101.0/24 ; destination-address 10.150.101.0/24 ;" " permit ;" application "Cli"&lt;BR /&gt;create access-list santral-pbx-deny " source-address 0.0.0.0/0 ; destination-address 10.150.101.0/24 ;" " deny ;" application "Cli"&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;configure access-list add santral-pbx-010 last priority 0 zone SYSTEM vlan Santral-PBX ingress&lt;BR /&gt;configure access-list add santral-pbx-020 last priority 0 zone SYSTEM vlan Santral-PBX ingress&lt;BR /&gt;configure access-list add santral-pbx-030 last priority 0 zone SYSTEM vlan Santral-PBX ingress&lt;BR /&gt;configure access-list add santral-pbx-040 last priority 0 zone SYSTEM vlan Santral-PBX ingress&lt;BR /&gt;configure access-list add santral-pbx-050 last priority 0 zone SYSTEM vlan Santral-PBX ingress&lt;BR /&gt;configure access-list add santral-pbx-060 last priority 0 zone SYSTEM vlan Santral-PBX ingress&lt;BR /&gt;configure access-list add santral-pbx-070 last priority 0 zone SYSTEM vlan Santral-PBX ingress&lt;BR /&gt;configure access-list add santral-pbx-080 last priority 0 zone SYSTEM vlan Santral-PBX ingress&lt;BR /&gt;configure access-list add santral-pbx-090 last priority 0 zone SYSTEM vlan Santral-PBX ingress&lt;BR /&gt;configure access-list add santral-pbx-100 last priority 0 zone SYSTEM vlan Santral-PBX ingress&lt;BR /&gt;configure access-list add santral-pbx-110 last priority 0 zone SYSTEM vlan Santral-PBX ingress&lt;BR /&gt;configure access-list add santral-pbx-120 last priority 0 zone SYSTEM vlan Santral-PBX ingress&lt;BR /&gt;configure access-list add santral-pbx-130 last priority 0 zone SYSTEM vlan Santral-PBX ingress&lt;BR /&gt;configure access-list add santral-pbx-deny last priority 0 zone SYSTEM vlan Santral-PBX ingress&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 19 Sep 2019 13:39:32 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-dynamic-acl-on-vlan-not-working/m-p/86112#M20661</guid>
      <dc:creator>Rahman_Duran</dc:creator>
      <dc:date>2019-09-19T13:39:32Z</dc:date>
    </item>
    <item>
      <title>Re: EXOS dynamic ACL on VLAN not working.</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-dynamic-acl-on-vlan-not-working/m-p/86113#M20662</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
I just deleted all the dynamic acl rules  and created a policy file: "santral-pbx.pol"&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;entry santralpbx-allowed-networks-01 {&lt;BR /&gt;        if match all {&lt;BR /&gt;                source-address 10.242.2.0/24;&lt;BR /&gt;                destination-address 10.150.101.0/24;&lt;BR /&gt;        } then {&lt;BR /&gt;                permit;&lt;BR /&gt;                count santralpbx-permit-count;&lt;BR /&gt;        }&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;entry santralpbx-allowed-networks-02 {&lt;BR /&gt;        if match all {&lt;BR /&gt;                source-address 192.168.10.0/24;&lt;BR /&gt;                destination-address 10.150.101.0/24;&lt;BR /&gt;        } then {&lt;BR /&gt;                permit;&lt;BR /&gt;                count santralpbx-permit-count;&lt;BR /&gt;        }&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;entry santralpbx-allowed-networks-03 {&lt;BR /&gt;        if match all {&lt;BR /&gt;                source-address 192.168.1.44/32;&lt;BR /&gt;                destination-address 10.150.101.0/24;&lt;BR /&gt;        } then {&lt;BR /&gt;                permit;&lt;BR /&gt;                count santralpbx-permit-count;&lt;BR /&gt;        }&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;entry santralpbx-allowed-networks-04 {&lt;BR /&gt;        if match all {&lt;BR /&gt;                source-address 192.168.1.183/32;&lt;BR /&gt;                destination-address 10.150.101.0/24;&lt;BR /&gt;        } then {&lt;BR /&gt;                permit;&lt;BR /&gt;                count santralpbx-permit-count;&lt;BR /&gt;        }&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;entry santralpbx-allowed-networks-05 {&lt;BR /&gt;        if match all {&lt;BR /&gt;                source-address 10.50.0.0/24;&lt;BR /&gt;                destination-address 10.150.101.0/24;&lt;BR /&gt;        } then {&lt;BR /&gt;                permit;&lt;BR /&gt;                count santralpbx-permit-count;&lt;BR /&gt;        }&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;entry santralpbx-allowed-networks-06 {&lt;BR /&gt;        if match all {&lt;BR /&gt;                source-address 10.110.101.0/24;&lt;BR /&gt;                destination-address 10.150.101.0/24;&lt;BR /&gt;        } then {&lt;BR /&gt;                permit;&lt;BR /&gt;                count santralpbx-permit-count;&lt;BR /&gt;        }&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;entry santralpbx-allowed-networks-07 {&lt;BR /&gt;        if match all {&lt;BR /&gt;                source-address 10.120.101.0/24;&lt;BR /&gt;                destination-address 10.150.101.0/24;&lt;BR /&gt;        } then {&lt;BR /&gt;                permit;&lt;BR /&gt;                count santralpbx-permit-count;&lt;BR /&gt;        }&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;entry santralpbx-allowed-networks-08 {&lt;BR /&gt;        if match all {&lt;BR /&gt;                source-address 10.130.101.0/24;&lt;BR /&gt;                destination-address 10.150.101.0/24;&lt;BR /&gt;        } then {&lt;BR /&gt;                permit;&lt;BR /&gt;                count santralpbx-permit-count;&lt;BR /&gt;        }&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;entry santralpbx-allowed-networks-09 {&lt;BR /&gt;        if match all {&lt;BR /&gt;                source-address 10.141.26.0/24;&lt;BR /&gt;                destination-address 10.150.101.0/24;&lt;BR /&gt;        } then {&lt;BR /&gt;                permit;&lt;BR /&gt;                count santralpbx-permit-count;&lt;BR /&gt;        }&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;entry santralpbx-allowed-networks-10 {&lt;BR /&gt;        if match all {&lt;BR /&gt;                source-address 10.146.101.0/24;&lt;BR /&gt;                destination-address 10.150.101.0/24;&lt;BR /&gt;        } then {&lt;BR /&gt;                permit;&lt;BR /&gt;                count santralpbx-permit-count;&lt;BR /&gt;        }&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;entry santralpbx-allowed-networks-11 {&lt;BR /&gt;        if match all {&lt;BR /&gt;                source-address 10.150.101.0/24;&lt;BR /&gt;                destination-address 10.150.101.0/24;&lt;BR /&gt;        } then {&lt;BR /&gt;                permit;&lt;BR /&gt;                count santralpbx-permit-count;&lt;BR /&gt;        }&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;entry santralpbx-allowed-networks-12 {&lt;BR /&gt;        if match all {&lt;BR /&gt;                source-address 10.160.101.0/24;&lt;BR /&gt;                destination-address 10.150.101.0/24;&lt;BR /&gt;        } then {&lt;BR /&gt;                permit;&lt;BR /&gt;                count santralpbx-permit-count;&lt;BR /&gt;        }&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;entry santralpbx-allowed-networks-13 {&lt;BR /&gt;        if match all {&lt;BR /&gt;                source-address 10.111.101.0/24;&lt;BR /&gt;                destination-address 10.150.101.0/24;&lt;BR /&gt;        } then {&lt;BR /&gt;                permit;&lt;BR /&gt;                count santralpbx-permit-count;&lt;BR /&gt;        }&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;entry santralpbx-deny-all {&lt;BR /&gt;        if {&lt;BR /&gt;                source-address 0.0.0.0/0;&lt;BR /&gt;                destination-address 10.150.101.0/24;&lt;BR /&gt;        } then {&lt;BR /&gt;                deny;&lt;BR /&gt;                count santralpbx-deny-count;&lt;BR /&gt;        }&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;BR /&gt;
As you see I permitted some subnets and at the end denied all sources. I applied this policy to ingress of vlan "Santral-PBX":&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;configure access-list santral-pbx vlan "Santral-PBX" ingress&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
But I can still ping and open web gui of ip phones from every where. It does not deny traffic as it should. When  I look to counter statistics it shows like this:&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;SAVSAT-METRO.3 # show access-list counter ingress&lt;BR /&gt;Policy Name       Vlan Name        Port   Direction&lt;BR /&gt;    Counter Name                   Packet Count         Byte Count&lt;BR /&gt;==================================================================&lt;BR /&gt;santral-pbx       Santral-PBX      *      ingress&lt;BR /&gt;    santralpbx-deny-count          0&lt;BR /&gt;    santralpbx-permit-count        11431&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
Any idea why it does not work? Should I apply the policy file to all ports instead of VLAN?&lt;BR /&gt;
&lt;BR /&gt;
Regards,&lt;BR /&gt;
&lt;BR /&gt;
Rahman</description>
      <pubDate>Wed, 25 Sep 2019 19:06:55 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-dynamic-acl-on-vlan-not-working/m-p/86113#M20662</guid>
      <dc:creator>Rahman_Duran</dc:creator>
      <dc:date>2019-09-25T19:06:55Z</dc:date>
    </item>
    <item>
      <title>Re: EXOS dynamic ACL on VLAN not working.</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-dynamic-acl-on-vlan-not-working/m-p/86114#M20663</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
I have not read the ACL exactly, but I think you control the traffic that would be routed to the PBX VLAN in the ACL, but then apply it inbound on the PBX VLAN itself. Thus the ACL does not see the traffic going to the PBX, but it sees traffic sent from the PBX.&lt;BR /&gt;
&lt;BR /&gt;
You would need to apply an ACL controlling access from outside to the PBX VLAN outbound on the PBX VLAN (&lt;I&gt;egress&lt;/I&gt; direction).&lt;BR /&gt;
&lt;BR /&gt;
On EXOS, ACLs are applied to the physical port, not to the logical routing function (Switched Virtual Interface) as in other implementations (e.g., ExtremeEOS).&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
Erik</description>
      <pubDate>Wed, 25 Sep 2019 22:35:27 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-dynamic-acl-on-vlan-not-working/m-p/86114#M20663</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2019-09-25T22:35:27Z</dc:date>
    </item>
    <item>
      <title>Re: EXOS dynamic ACL on VLAN not working.</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-dynamic-acl-on-vlan-not-working/m-p/86115#M20664</link>
      <description>&lt;BR /&gt;
Hi Erik,&lt;BR /&gt;
&lt;BR /&gt;
Thanks for the suggestion, I will try it and report back if it woks.&lt;BR /&gt;
&lt;BR /&gt;
Every example I saw on community hub and GTAC suggested to apply ACL to ingress of the VLANs. I read whole documentation of EXOS on ACLs a few time already. I think documentation needs some clarification on "which traffic is ingress to VLAN and which is egress from VLAN". It is not very clear.&lt;BR /&gt;
&lt;BR /&gt;
When I read the documentation I understand "traffic routed to the VLAN is ingress traffic for that VLAN" and "traffic originating from VLAN and routed to other VLANs egress traffic for that VLAN".&lt;BR /&gt;
&lt;BR /&gt;
Regards,&lt;BR /&gt;
&lt;BR /&gt;
Rahman</description>
      <pubDate>Thu, 26 Sep 2019 12:45:27 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-dynamic-acl-on-vlan-not-working/m-p/86115#M20664</guid>
      <dc:creator>Rahman_Duran</dc:creator>
      <dc:date>2019-09-26T12:45:27Z</dc:date>
    </item>
    <item>
      <title>Re: EXOS dynamic ACL on VLAN not working.</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-dynamic-acl-on-vlan-not-working/m-p/86116#M20665</link>
      <description>Ingress and egress can be confusing, especially with VLANs. Ingress to a VLAN means packets coming in on a port that is a member of that VLAN, tagged or not. I honestly don't know if a packet that is being routed from another VLAN and then passes a certain VLAN is actually considered as ingressing that VLAN, but I don't think so as it is actually rather egressing the port and hence it is considered egressing the VLAN.&lt;BR /&gt;
&lt;BR /&gt;
It should be fairly simple to find out by applying your policy on ingress on some other VLAN that is supposed to be blocked by the policy.&lt;BR /&gt;
&lt;BR /&gt;
/Fredrik</description>
      <pubDate>Thu, 26 Sep 2019 19:29:16 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-dynamic-acl-on-vlan-not-working/m-p/86116#M20665</guid>
      <dc:creator>FredrikB</dc:creator>
      <dc:date>2019-09-26T19:29:16Z</dc:date>
    </item>
    <item>
      <title>Re: EXOS dynamic ACL on VLAN not working.</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-dynamic-acl-on-vlan-not-working/m-p/86117#M20666</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
&lt;USER-MENTION data-id="8167008"&gt;@Erik Auerswald&lt;/USER-MENTION&gt;  &lt;USER-MENTION data-id="9867978"&gt;@FredrikB&lt;/USER-MENTION&gt;  thank you both for your helps. Applying the ACL to the egress of the PBX VLAN solved the issue.&lt;BR /&gt;
&lt;BR /&gt;
I still think EXOS documentation needs more polishing and more examples about the routed traffic directions about VLANs.&lt;BR /&gt;
&lt;BR /&gt;
Regards,&lt;BR /&gt;
&lt;BR /&gt;
Rahman</description>
      <pubDate>Fri, 27 Sep 2019 13:17:39 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-dynamic-acl-on-vlan-not-working/m-p/86117#M20666</guid>
      <dc:creator>Rahman_Duran</dc:creator>
      <dc:date>2019-09-27T13:17:39Z</dc:date>
    </item>
    <item>
      <title>Re: EXOS dynamic ACL on VLAN not working.</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-dynamic-acl-on-vlan-not-working/m-p/86118#M20667</link>
      <description>"I still think EXOS documentation needs more polishing and more examples about the routed traffic directions about VLANs."&lt;BR /&gt;
&lt;BR /&gt;
I agree. Either more real-world examples in the user guide or a reference to a collection of such examples on the web would be very helpful. Sadly, this seems to be a hard nut for Extreme to crack, probably due to unwillingness to put out examples that may break in future releases, ending up in support cases where customers want this or that example to work in their environment. I guess that's what this forum is supposed to address to some extent.</description>
      <pubDate>Fri, 27 Sep 2019 13:39:08 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-dynamic-acl-on-vlan-not-working/m-p/86118#M20667</guid>
      <dc:creator>FredrikB</dc:creator>
      <dc:date>2019-09-27T13:39:08Z</dc:date>
    </item>
    <item>
      <title>Re: EXOS dynamic ACL on VLAN not working.</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-dynamic-acl-on-vlan-not-working/m-p/86119#M20668</link>
      <description>&lt;P&gt;OMGOMG I feel as confused as possible coming from Cisco. Ingress/Egress rattle my thinking and blocks me from the correct command syntax.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Oct 2021 22:55:16 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-dynamic-acl-on-vlan-not-working/m-p/86119#M20668</guid>
      <dc:creator>bcyrus</dc:creator>
      <dc:date>2021-10-01T22:55:16Z</dc:date>
    </item>
  </channel>
</rss>

