<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic how deep the packet can be analysed for acl execution in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/how-deep-the-packet-can-be-analysed-for-acl-execution/m-p/88204#M20970</link>
    <description>The ACL Solutions Guide wrote:&lt;BR /&gt;
&lt;BLOCKQUOTE&gt;Once a packet comes into the ingress ACL stage, the field parser breaks the packet into importantfields. There are too many to list here, but a short list could include Layer 2, 3, and 4 fields, MAC source,MAC destination, IP source, IP destination, Layer 4 ports, VLAN ID, outer VLAN, inner VLAN, outerpriority bits, inner priority bits, protocol, TCP flags, etc., as well as metadata that is passed in the packetfrom forwarding database lookups.&lt;/BLOCKQUOTE&gt;&lt;BR /&gt;
but how deep packet will be anaylsed to separate the target and source ip ? &lt;BR /&gt;
Cos I do have to allow all frames from a specific mac except if the ip (src/dest) is a specific one or the protocol is igmp and the frame can be triple vlan tagged with three stacked 0x8100 tags.&lt;BR /&gt;
&lt;BR /&gt;
Will it work ? Do you have an example ?</description>
    <pubDate>Wed, 05 Jun 2019 17:06:00 GMT</pubDate>
    <dc:creator>Immo_Wetzel</dc:creator>
    <dc:date>2019-06-05T17:06:00Z</dc:date>
    <item>
      <title>how deep the packet can be analysed for acl execution</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/how-deep-the-packet-can-be-analysed-for-acl-execution/m-p/88204#M20970</link>
      <description>The ACL Solutions Guide wrote:&lt;BR /&gt;
&lt;BLOCKQUOTE&gt;Once a packet comes into the ingress ACL stage, the field parser breaks the packet into importantfields. There are too many to list here, but a short list could include Layer 2, 3, and 4 fields, MAC source,MAC destination, IP source, IP destination, Layer 4 ports, VLAN ID, outer VLAN, inner VLAN, outerpriority bits, inner priority bits, protocol, TCP flags, etc., as well as metadata that is passed in the packetfrom forwarding database lookups.&lt;/BLOCKQUOTE&gt;&lt;BR /&gt;
but how deep packet will be anaylsed to separate the target and source ip ? &lt;BR /&gt;
Cos I do have to allow all frames from a specific mac except if the ip (src/dest) is a specific one or the protocol is igmp and the frame can be triple vlan tagged with three stacked 0x8100 tags.&lt;BR /&gt;
&lt;BR /&gt;
Will it work ? Do you have an example ?</description>
      <pubDate>Wed, 05 Jun 2019 17:06:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/how-deep-the-packet-can-be-analysed-for-acl-execution/m-p/88204#M20970</guid>
      <dc:creator>Immo_Wetzel</dc:creator>
      <dc:date>2019-06-05T17:06:00Z</dc:date>
    </item>
    <item>
      <title>Re: how deep the packet can be analysed for acl execution</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/how-deep-the-packet-can-be-analysed-for-acl-execution/m-p/88205#M20971</link>
      <description>I'm not sure on which device you have and are using, but there is a precedence on traffic classification rules. This is from an old Policy manager manual I have, but unfortunately in your case, MAC is the first rule to hit. Also I'm not sure that we can identify triple TPIDs.&lt;BR /&gt;
&lt;BR /&gt;
it sounds like you need something really custom for this.&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="55524121ff2e4dc39653224d6436ae54_55777d79-4d82-41c1-b997-ea9f9f0e6f3a.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/5149iD4BAF2012CFC9965/image-size/large?v=v2&amp;amp;px=999" role="button" title="55524121ff2e4dc39653224d6436ae54_55777d79-4d82-41c1-b997-ea9f9f0e6f3a.png" alt="55524121ff2e4dc39653224d6436ae54_55777d79-4d82-41c1-b997-ea9f9f0e6f3a.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2019 10:04:33 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/how-deep-the-packet-can-be-analysed-for-acl-execution/m-p/88205#M20971</guid>
      <dc:creator>Matthew_Hum</dc:creator>
      <dc:date>2019-07-11T10:04:33Z</dc:date>
    </item>
    <item>
      <title>Re: how deep the packet can be analysed for acl execution</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/how-deep-the-packet-can-be-analysed-for-acl-execution/m-p/88206#M20972</link>
      <description>Hi Immo, Matthew,&lt;BR /&gt;
&lt;BR /&gt;
Since 30.2 in EXOS there is a new feature, seems to get expanded over time, Classification Rule Precedence Re-ordering for Policy, with MAC, IPv6, IPv4, and Layer2 as options at the moment. Please see the release notes: https://documentation.extremenetworks.com/release_notes/ExtremeXOS/30.2/downloads/GUID-239F0B67-21C6-4460-88BE-99289275F8C1.pdf&lt;BR /&gt;
&lt;BR /&gt;
Hope that helps,&lt;BR /&gt;
Tomasz</description>
      <pubDate>Fri, 12 Jul 2019 02:57:55 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/how-deep-the-packet-can-be-analysed-for-acl-execution/m-p/88206#M20972</guid>
      <dc:creator>Tomasz</dc:creator>
      <dc:date>2019-07-12T02:57:55Z</dc:date>
    </item>
  </channel>
</rss>

