<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: EXOS ACL, Explict, Match, Dynamic, Policy in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29432#M4822</link>
    <description>Also, don't confuse ACL with Policies (Routing Policies). They share the same syntax pre-processor, but behave slightly differently, while Routing Policies do have a "match any" that is not available to ACL.&lt;BR /&gt;</description>
    <pubDate>Tue, 04 Aug 2015 23:07:00 GMT</pubDate>
    <dc:creator>Stephane_Grosj1</dc:creator>
    <dc:date>2015-08-04T23:07:00Z</dc:date>
    <item>
      <title>EXOS ACL, Explict, Match, Dynamic, Policy</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29427#M4817</link>
      <description>Have some specific questions about EXOS ACL's I am hoping someone can help with:&lt;BR /&gt;
&lt;BR /&gt;
&lt;OL&gt; 
&lt;LI&gt;Dynamic and Policy ACL's - do these have a Explicit Deny or Permit at the end of each. I know I can create either / or but not sure what the default process is and if its the same for each type? 
&lt;/LI&gt;&lt;LI&gt;If I create a Policy ACL with just an 'if' statement and NO match condition, i.e. 'match all', would it still match all elements in the statement like Source Address, Protocol and Port Number? 
&lt;/LI&gt;&lt;LI&gt;Whats the main difference and reasons for creating ACL's as a policy than Dynamic and visa versa, here's some that I can think of:&lt;/LI&gt;&lt;/OL&gt;&lt;UL&gt; 
&lt;LI&gt;Policy ACL you can edit the rule, i.e. if you wanted to add a count to a rule as opposed to a Dynamic ACL you would have to remove the ACL and re-add it amended. 
&lt;/LI&gt;&lt;LI&gt;Dynamic ACL's help if you are used to writing them directly in the command line. 
&lt;/LI&gt;&lt;LI&gt;Dynamic ACL's you can re-use rules per individual rule. 
&lt;/LI&gt;&lt;LI&gt;Policy ACL's you can apply many rules at once with a single command.&lt;/LI&gt;&lt;/UL&gt;Thanks in advance.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 04 Aug 2015 17:00:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29427#M4817</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2015-08-04T17:00:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS ACL, Explict, Match, Dynamic, Policy</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29428#M4818</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
In case you didn't notice, we also have a dedicated ACL guide, in addition to our User Guide.&lt;BR /&gt;
&lt;BR /&gt;
1. ACL have an implicit default permit all, while Routing Policy have an implicit default deny all.&lt;BR /&gt;
2. If you are referring to the fact to have 'match all' or 'match any' for a policy, if none specified, it defaults to 'match all'.&lt;BR /&gt;
&lt;BR /&gt;
Rdgs&lt;BR /&gt;</description>
      <pubDate>Tue, 04 Aug 2015 21:25:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29428#M4818</guid>
      <dc:creator>Stephane_Grosj1</dc:creator>
      <dc:date>2015-08-04T21:25:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS ACL, Explict, Match, Dynamic, Policy</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29429#M4819</link>
      <description>Hi Stephane,&lt;BR /&gt;
&lt;BR /&gt;
Thanks for replying.&lt;BR /&gt;
&lt;BR /&gt;
Have read the ACL guide, but think because of the slight contradiction the confusion has come about. So just to confirm your answer are you saying with the examples 1 &amp;amp; 2 below there is a default permit all and example 3 there is a default deny all:&lt;BR /&gt;
&lt;BR /&gt;
&lt;U&gt;Example 1&lt;/U&gt;&lt;BR /&gt;
&lt;BR /&gt;
test_policy1.pol&lt;BR /&gt;
&lt;BR /&gt;
entry test_policy1 {&lt;BR /&gt;
 if {&lt;BR /&gt;
  source-address 25.25.25.1/32;&lt;BR /&gt;
  destination-address 10.10.10.24/32;&lt;BR /&gt;
  }then {&lt;BR /&gt;
   deny;&lt;BR /&gt;
  }&lt;BR /&gt;
 }&lt;BR /&gt;
&lt;BR /&gt;
configure access-list test_policy1 first port 1:1 ingress&lt;BR /&gt;
&lt;BR /&gt;
&lt;U&gt;Example 2&lt;/U&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;U&gt;&lt;/U&gt;&lt;BR /&gt;
&lt;BR /&gt;
create access-list test_dynamic "source-address 25.25.25.1/32;destination-address 10.10.10.24/32;" "deny;"&lt;BR /&gt;
&lt;BR /&gt;
configure access-list add test_dynamic first port 1:1 ingress&lt;BR /&gt;
&lt;BR /&gt;
&lt;U&gt;Example 3&lt;/U&gt;&lt;BR /&gt;
&lt;BR /&gt;
entry test_PBR {&lt;BR /&gt;
 If {&lt;BR /&gt;
  nlri 22.16.0.0/14;&lt;BR /&gt;
  } then {&lt;BR /&gt;
   permit;&lt;BR /&gt;
  }&lt;BR /&gt;
 }&lt;BR /&gt;
&lt;BR /&gt;
configure access-list test_PBR first port 1:1 ingress&lt;BR /&gt;
&lt;BR /&gt;
----------------------&lt;BR /&gt;
&lt;BR /&gt;
Also, one other thing just to clarify is that all these ACL's act on traffic by exiting on match, unlike policy in Enterasys where they keep going down the list?&lt;BR /&gt;
&lt;BR /&gt;
Many thanks.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 04 Aug 2015 22:17:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29429#M4819</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2015-08-04T22:17:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS ACL, Explict, Match, Dynamic, Policy</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29430#M4820</link>
      <description>Hey Martin&lt;BR /&gt;
&lt;BR /&gt;
You are correct in your statements This is the section from the user guide.&lt;BR /&gt;
"The following is an example of a policy entry:"&lt;BR /&gt;
"entry ip_entry {"&lt;BR /&gt;
"if match any {"&lt;BR /&gt;
"nlri  10.203.134.0/24;"&lt;BR /&gt;
"nlri  10.204.134.0/24;"&lt;BR /&gt;
"} then {"&lt;BR /&gt;
"next-hop  192.168.174.92;"&lt;BR /&gt;
"origin  egp;"&lt;BR /&gt;
"}"&lt;BR /&gt;
"}"&lt;BR /&gt;
"Policy entries are evaluated in order, from the beginning of the file to the end, as follows:"&lt;BR /&gt;
"•  &lt;B&gt;&lt;I&gt;If a match occurs, the action in the then statement is taken:"&lt;/I&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;&lt;I&gt;"•   if the action contains an explicit permit or deny, the evaluation process  terminates."&lt;/I&gt;&lt;/B&gt;&lt;BR /&gt;
"•   if the action does not contain an explicit permit or deny, the action is an implicit permit, and the evaluation process  terminates."&lt;BR /&gt;
"•  If a match does not occur, the next policy entry is evaluated."&lt;BR /&gt;
"•&lt;B&gt;&lt;I&gt;  If no match has occurred  after evaluating all policy entries, the default action is deny."&lt;/I&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
In your third example to apply the route-policy you need to use the configure bgp import-policy command as shown below&lt;BR /&gt;
&lt;BR /&gt;
Applying route-policies&lt;BR /&gt;
&lt;BR /&gt;
"To apply a routing policy, use the command appropriate to the client. Different protocols  support"&lt;BR /&gt;
"different ways to apply policies, but there are some generalities."&lt;BR /&gt;
"Commands  that use the keyword import-policy are used to change the attributes of routes installed"&lt;BR /&gt;
"into the switch routing table by the protocol. These commands cannot be used to determine the routes"&lt;BR /&gt;
"to be added to the routing table. The following are examples  for the BGP and RIP protocols:"&lt;BR /&gt;
"configure bgp import-policy [policy-name | none]"&lt;BR /&gt;
"configure rip import-policy [policy-name | none]"&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 04 Aug 2015 22:54:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29430#M4820</guid>
      <dc:creator>Paul_Russo</dc:creator>
      <dc:date>2015-08-04T22:54:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS ACL, Explict, Match, Dynamic, Policy</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29431#M4821</link>
      <description>I answered too fast and too lightly, I assumed something in your question&lt;BR /&gt;
&lt;BR /&gt;
Policies:&lt;BR /&gt;
&lt;BR /&gt;
- There can be zero or one match type. If no match type is specified, the match type is all, so all match conditions must be satisfied&lt;BR /&gt;
- There can be zero or more match conditions. If no match is specified, then every routing entity matches.&lt;BR /&gt;
- There can be zero or more actions. If no action is specified, the packet is permitted by default.&lt;BR /&gt;
&lt;BR /&gt;
Default action&lt;BR /&gt;
Keep in mind the behavior of ExtremeXOS. If you don’t apply a routing policy, the default action is permit. In the same manner, if no action in a policy rule that matches is defined, the default action is also permit. However in a routing policy, the default action for anything that doesn’t match any entries is deny.&lt;BR /&gt;
&lt;BR /&gt;
Policy entries are evaluated in order, from the beginning of the file to the end, as follows:&lt;BR /&gt;
- If a match occurs, the action in the then statement is taken.&lt;BR /&gt;
    o If the action contains an explicit permit or deny, the evaluation process terminates.&lt;BR /&gt;
    o If the action doesn’t contain an explicit permit or deny, the action is an implicit permit, and the evaluation process terminates.&lt;BR /&gt;
- If a match doesn’t occur, the next policy entry is evaluated.&lt;BR /&gt;
- If no match has occurred after evaluating all policy entries, the default action is deny.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 04 Aug 2015 23:02:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29431#M4821</guid>
      <dc:creator>Stephane_Grosj1</dc:creator>
      <dc:date>2015-08-04T23:02:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS ACL, Explict, Match, Dynamic, Policy</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29432#M4822</link>
      <description>Also, don't confuse ACL with Policies (Routing Policies). They share the same syntax pre-processor, but behave slightly differently, while Routing Policies do have a "match any" that is not available to ACL.&lt;BR /&gt;</description>
      <pubDate>Tue, 04 Aug 2015 23:07:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29432#M4822</guid>
      <dc:creator>Stephane_Grosj1</dc:creator>
      <dc:date>2015-08-04T23:07:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS ACL, Explict, Match, Dynamic, Policy</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29433#M4823</link>
      <description>Many thanks for taking the time reply, now all understood. &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 04 Aug 2015 23:21:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29433#M4823</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2015-08-04T23:21:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS ACL, Explict, Match, Dynamic, Policy</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29434#M4824</link>
      <description>Here is a link to the guide for anyone else following the thread:  &lt;A href="http://extrcdn.extremenetworks.com/wp-content/uploads/2014/10/ACL_Solutions_Guide.pdf" target="_blank" rel="nofollow noreferrer noopener"&gt;http://extrcdn.extremenetworks.com/wp-content/uploads/2014/10/ACL_Solutions_Guide.pdf&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 05 Aug 2015 17:12:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29434#M4824</guid>
      <dc:creator>Bill_Stritzinge</dc:creator>
      <dc:date>2015-08-05T17:12:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS ACL, Explict, Match, Dynamic, Policy</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29435#M4825</link>
      <description>&lt;P&gt;Seems that&amp;nbsp;ACL based matching on XOS 15.6 doesn’t support matching of the inner dot1p/q tag. Is there a newer software that support it?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2020 19:48:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/exos-acl-explict-match-dynamic-policy/m-p/29435#M4825</guid>
      <dc:creator>Peder_Bach</dc:creator>
      <dc:date>2020-01-23T19:48:00Z</dc:date>
    </item>
  </channel>
</rss>

