<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Redirect traffic with acl in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redirect-traffic-with-acl/m-p/86749#M20751</link>
    <description>Hi Piracanjuba,&lt;BR /&gt;
&lt;BR /&gt;
Is it possible to see the switch config and ACL content?&lt;BR /&gt;
&lt;BR /&gt;
Kind regards,&lt;BR /&gt;
Tomasz</description>
    <pubDate>Wed, 17 Apr 2019 02:51:37 GMT</pubDate>
    <dc:creator>Tomasz</dc:creator>
    <dc:date>2019-04-17T02:51:37Z</dc:date>
    <item>
      <title>Redirect traffic with acl</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redirect-traffic-with-acl/m-p/86748#M20750</link>
      <description>I have a switch core x460 with some vlans, one of then is 10.10.22.0/24, I created an acl and applied on vlan (10.10.22.0/24), to redirected traffic to other gateway. Why the packet ignore the all route table ? When I applied the acl the traffic is sended to the redirected gateway and the vlan(10.10.22.0/24) doesn´t communicate with other vlans directe connect on the switch.</description>
      <pubDate>Wed, 17 Apr 2019 02:43:59 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redirect-traffic-with-acl/m-p/86748#M20750</guid>
      <dc:creator>Piracanjuba</dc:creator>
      <dc:date>2019-04-17T02:43:59Z</dc:date>
    </item>
    <item>
      <title>Re: Redirect traffic with acl</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redirect-traffic-with-acl/m-p/86749#M20751</link>
      <description>Hi Piracanjuba,&lt;BR /&gt;
&lt;BR /&gt;
Is it possible to see the switch config and ACL content?&lt;BR /&gt;
&lt;BR /&gt;
Kind regards,&lt;BR /&gt;
Tomasz</description>
      <pubDate>Wed, 17 Apr 2019 02:51:37 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redirect-traffic-with-acl/m-p/86749#M20751</guid>
      <dc:creator>Tomasz</dc:creator>
      <dc:date>2019-04-17T02:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: Redirect traffic with acl</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redirect-traffic-with-acl/m-p/86750#M20752</link>
      <description>Hi Tomasz,&lt;BR /&gt;
Thanks for your help !&lt;BR /&gt;
the acl is :&lt;BR /&gt;
 Entry redirect {&lt;BR /&gt;
 If match all {&lt;BR /&gt;
 source-address 10.10.22.0/24;&lt;BR /&gt;
 } then {&lt;BR /&gt;
 permit;&lt;BR /&gt;
 redirect-name GYN_redirect;&lt;BR /&gt;
 }&lt;BR /&gt;
 }&lt;BR /&gt;
and, I created flow-redirect and applied acl on vlan&lt;BR /&gt;
&lt;BR /&gt;
create flow-redirect GYN_redirect&lt;BR /&gt;
configure flow-redirect GYN_redirect add nexthop 172.16.31.1 priority 100&lt;BR /&gt;
configure access-list ACL_gyn_teste vlan 113 ingress&lt;BR /&gt;
&lt;BR /&gt;
Follow, a part of the config :&lt;BR /&gt;
create vlan "Administrativo"&lt;BR /&gt;
configure vlan Administrativo tag 24&lt;BR /&gt;
create vlan "Automacao"&lt;BR /&gt;
configure vlan Automacao tag 14&lt;BR /&gt;
create vlan "CFTV"&lt;BR /&gt;
configure vlan CFTV tag 10&lt;BR /&gt;
create vlan "Controle_de_Acesso"&lt;BR /&gt;
configure vlan Controle_de_Acesso tag 12&lt;BR /&gt;
create vlan "DEPART"&lt;BR /&gt;
configure vlan DEPART tag 88&lt;BR /&gt;
create vlan "Engenharia"&lt;BR /&gt;
configure vlan Engenharia tag 18&lt;BR /&gt;
create vlan "fort_lan"&lt;BR /&gt;
configure vlan fort_lan tag 131&lt;BR /&gt;
create vlan "Gerencia_de_Switches"&lt;BR /&gt;
configure vlan Gerencia_de_Switches tag 16&lt;BR /&gt;
create vlan "Impressoras"&lt;BR /&gt;
configure vlan Impressoras tag 17&lt;BR /&gt;
create vlan "Marketing"&lt;BR /&gt;
configure vlan Marketing tag 19&lt;BR /&gt;
create vlan "Mikrotik"&lt;BR /&gt;
configure vlan Mikrotik description "MIKROTIK"&lt;BR /&gt;
configure vlan Mikrotik tag 124&lt;BR /&gt;
create vlan "SAC"&lt;BR /&gt;
configure vlan SAC tag 20&lt;BR /&gt;
create vlan "TI"&lt;BR /&gt;
configure vlan TI tag 113&lt;BR /&gt;
&lt;BR /&gt;
&lt;BR /&gt;
&lt;BR /&gt;
configure vlan TI ipaddress 10.10.22.1 255.255.255.0&lt;BR /&gt;
enable ipforwarding vlan TI&lt;BR /&gt;
configure vlan Automacao ipaddress 10.10.14.1 255.255.254.0&lt;BR /&gt;
enable ipforwarding vlan Automacao&lt;BR /&gt;
configure vlan CFTV ipaddress 10.10.10.1 255.255.254.0&lt;BR /&gt;
enable ipforwarding vlan CFTV&lt;BR /&gt;
configure vlan Controle_de_Acesso ipaddress 10.10.12.1 255.255.254.0&lt;BR /&gt;
enable ipforwarding vlan Controle_de_Acesso&lt;BR /&gt;
configure vlan Engenharia ipaddress 10.10.18.1 255.255.255.0&lt;BR /&gt;
enable ipforwarding vlan Engenharia&lt;BR /&gt;
configure vlan Gerencia_de_Switches ipaddress 10.10.16.1 255.255.255.0&lt;BR /&gt;
enable ipforwarding vlan Gerencia_de_Switches&lt;BR /&gt;
configure vlan Impressoras ipaddress 10.10.17.1 255.255.255.0&lt;BR /&gt;
enable ipforwarding vlan Impressoras&lt;BR /&gt;
configure vlan SAC ipaddress 10.10.20.1 255.255.255.0&lt;BR /&gt;
enable ipforwarding vlan SAC&lt;BR /&gt;
configure vlan Administrativo ipaddress 10.10.24.1 255.255.254.0&lt;BR /&gt;
enable ipforwarding vlan Administrativo&lt;BR /&gt;
configure vlan VoIP ipaddress 10.10.8.1 255.255.254.0&lt;BR /&gt;
enable ipforwarding vlan VoIP&lt;BR /&gt;
configure vlan Marketing ipaddress 10.10.19.1 255.255.255.0&lt;BR /&gt;
enable ipforwarding vlan Marketing&lt;BR /&gt;
configure vlan DMZ ipaddress 172.31.0.2 255.255.255.248&lt;BR /&gt;
enable ipforwarding vlan DMZ&lt;BR /&gt;
configure vlan DEPART ipaddress 10.10.88.1 255.255.255.0&lt;BR /&gt;
enable ipforwarding vlan DEPART&lt;BR /&gt;
configure vlan Mikrotik ipaddress 172.31.10.2 255.255.255.0&lt;BR /&gt;
enable ipforwarding vlan Mikrotik&lt;BR /&gt;
configure vlan fort_lan ipaddress 172.16.31.2 255.255.255.0&lt;BR /&gt;
enable ipforwarding vlan fort_lan&lt;BR /&gt;
&lt;BR /&gt;
&lt;BR /&gt;
#&lt;BR /&gt;
configure iproute add 10.40.26.0 255.255.255.0 172.31.10.1&lt;BR /&gt;
configure iproute add 10.40.30.0 255.255.255.0 172.31.10.1&lt;BR /&gt;
configure iproute add default 172.31.0.1&lt;BR /&gt;
&lt;BR /&gt;
#&lt;BR /&gt;
# Module acl configuration.&lt;BR /&gt;
#&lt;BR /&gt;
&lt;BR /&gt;
create flow-redirect GYN_redirect&lt;BR /&gt;
configure flow-redirect GYN_redirect add nexthop 172.16.31.1 priority 100&lt;BR /&gt;
configure access-list ACL_GYN_redirect vlan "TI" ingress&lt;BR /&gt;
#&lt;BR /&gt;
# Module hal configuration.&lt;BR /&gt;
#&lt;BR /&gt;
configure iproute sharing max-gateways 4&lt;BR /&gt;
&lt;BR /&gt;
Thanks again !</description>
      <pubDate>Wed, 17 Apr 2019 03:02:47 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redirect-traffic-with-acl/m-p/86750#M20752</guid>
      <dc:creator>Piracanjuba</dc:creator>
      <dc:date>2019-04-17T03:02:47Z</dc:date>
    </item>
    <item>
      <title>Re: Redirect traffic with acl</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redirect-traffic-with-acl/m-p/86751#M20753</link>
      <description>So the ACL you've created applies the PBR behavior to entire TI-originated traffic, that's the purpose - to redirect regardless what's inside a routing table.&lt;BR /&gt;
Are there some additional criteria you could use so only specific type of traffic (e.g. TCP port) would get redirected? Then all the remaining traffic would be routed based on the routing table.&lt;BR /&gt;
&lt;BR /&gt;
I don't have any elegant solution in my mind at the moment, you could try to implement routes for TI to other 'local' VLANs at this 172.16.31.1 gateway, but that will lead you to assymetric traffic pattern (from TI to other local VLANs through another gateway, from local VLANs back to TI directly)...&lt;BR /&gt;
&lt;BR /&gt;
If you want to have local routing performed by X460, is there any point in having that redirection? Is the assymetric traffic flow acceptable?&lt;BR /&gt;
&lt;BR /&gt;
Kind regards,&lt;BR /&gt;
Tomasz</description>
      <pubDate>Wed, 17 Apr 2019 03:52:32 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redirect-traffic-with-acl/m-p/86751#M20753</guid>
      <dc:creator>Tomasz</dc:creator>
      <dc:date>2019-04-17T03:52:32Z</dc:date>
    </item>
    <item>
      <title>Re: Redirect traffic with acl</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redirect-traffic-with-acl/m-p/86752#M20754</link>
      <description>Tomasz,&lt;BR /&gt;
I solved the question, putting the gateway on the same vlan of the network 10.10.22.0/24 and created routes on the new gateway directing back to the extreme switch.&lt;BR /&gt;
for now this help me.&lt;BR /&gt;
&lt;BR /&gt;
Tks for help me !</description>
      <pubDate>Thu, 18 Apr 2019 03:26:46 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redirect-traffic-with-acl/m-p/86752#M20754</guid>
      <dc:creator>Piracanjuba</dc:creator>
      <dc:date>2019-04-18T03:26:46Z</dc:date>
    </item>
  </channel>
</rss>

