<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACL for Office365 in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/acl-for-office365/m-p/17958#M677</link>
    <description>I am creating a ACL that basically blocks about 240+ M$ Office365 related IP addresses so that Websense will not block the traffic.  Web traffic is coming off of a VSS tap into my Summit X460 on port 47 and then I have that mirrored to port 48 going to the Websense server. I do not want Websense to see 240+ IP addresses so I created an ACL to deny. It seems VERY hit and miss whether this works or not. It seemed pretty straight forward to me. Here is an example of the list and my ACL setup. I had to put it on the egress port because the Mirror port kept doing it's thing before anything else if I tried putting it on the incoming port 47. It works pretty well but occasionally I can see Websense getting a packet to one of the below IPs and see the RST packet which in turn blocks the user from getting to &lt;A href="https://outlook.com" target="_blank" rel="nofollow noreferrer noopener"&gt;https://outlook.com&lt;/A&gt; or &lt;A href="https://outlook.office365.com" target="_blank" rel="nofollow noreferrer noopener"&gt;https://outlook.office365.com&lt;/A&gt; and various other M$ sites that have been defined to be denied. You so not see it in this snippit of the ACL but 132.245.0.0/16 is setup for outlook.office365.com &lt;BR /&gt;
&lt;BR /&gt;
Tap &amp;gt; Port 47 &amp;gt; Port 48 (Mirror) &amp;gt; Websense server&lt;BR /&gt;
&lt;BR /&gt;
configure ports 47 display-string From_Tap&lt;BR /&gt;
configure ports 48 display-string To_Websense&lt;BR /&gt;
configure mirror DefaultMirror to port 48 &lt;BR /&gt;
enable mirror DefaultMirror&lt;BR /&gt;
configure mirror DefaultMirror add port 47 ingress-and-egress&lt;BR /&gt;
&lt;BR /&gt;
configure access-list Office365-any ports 48 egress&lt;BR /&gt;
&lt;BR /&gt;
entry 65.55.150.61_32 { &lt;BR /&gt;
if match all { &lt;BR /&gt;
    destination-address 65.55.150.61/32 ;&lt;BR /&gt;
}&lt;BR /&gt;
then {&lt;BR /&gt;
    deny  ;&lt;BR /&gt;
    count 65.55.150.61_32 ;&lt;BR /&gt;
}&lt;BR /&gt;
}&lt;BR /&gt;
entry 65.55.150.160_32 { &lt;BR /&gt;
if match all { &lt;BR /&gt;
    destination-address 65.55.150.160/32 ;&lt;BR /&gt;
}&lt;BR /&gt;
then {&lt;BR /&gt;
    deny  ;&lt;BR /&gt;
    count 65.55.150.160_32 ;&lt;BR /&gt;
}&lt;BR /&gt;
}&lt;BR /&gt;
entry 134.170.52.122_32 { &lt;BR /&gt;
if match all { &lt;BR /&gt;
    destination-address 134.170.52.122/32 ;&lt;BR /&gt;
}&lt;BR /&gt;
then {&lt;BR /&gt;
    deny  ;&lt;BR /&gt;
    count 134.170.52.122_32 ;&lt;BR /&gt;
}&lt;BR /&gt;
}&lt;BR /&gt;
entry 134.170.52.123_32 { &lt;BR /&gt;
if match all { &lt;BR /&gt;
    destination-address 134.170.52.123/32 ;&lt;BR /&gt;
}&lt;BR /&gt;
then {&lt;BR /&gt;
    deny  ;&lt;BR /&gt;
    count 134.170.52.123_32 ;&lt;BR /&gt;
}&lt;BR /&gt;
}&lt;BR /&gt;
entry 134.170.52.124_32 { &lt;BR /&gt;
if match all { &lt;BR /&gt;
    destination-address 134.170.52.124/32 ;&lt;BR /&gt;
}&lt;BR /&gt;
then {&lt;BR /&gt;
    deny  ;&lt;BR /&gt;
    count 134.170.52.124_32 ;&lt;BR /&gt;
}&lt;BR /&gt;
}&lt;BR /&gt;
entry 157.56.138.141_32 { &lt;BR /&gt;
if match all { &lt;BR /&gt;
    destination-address 157.56.138.141/32 ;&lt;BR /&gt;
}&lt;BR /&gt;
then {&lt;BR /&gt;
    deny  ;&lt;BR /&gt;
    count 157.56.138.141_32 ;&lt;BR /&gt;
}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
This might not match the above ACL policy because I just took the first few instead of listing all of them but here is an example of the ACL hitting my counters.&lt;BR /&gt;
&lt;BR /&gt;
Policy Name       Vlan Name        Port   Direction      Counter Name                   Packet Count         Byte Count           &lt;BR /&gt;
==================================================================&lt;BR /&gt;
Office365-any     *                48     egress    &lt;BR /&gt;
    104.209.190.8_32               5638                                      &lt;BR /&gt;
    104.209.35.177_32              0                                         &lt;BR /&gt;
    104.210.212.243_32             4879                                      &lt;BR /&gt;
    104.210.4.77_32                2357                                      &lt;BR /&gt;
    104.210.40.87_32               4496                                      &lt;BR /&gt;
    104.214.35.244_32              7445                                      &lt;BR /&gt;
    104.215.146.200_32             3836                                      &lt;BR /&gt;
    104.215.198.144_32             6097                                      &lt;BR /&gt;
    104.41.207.73_32               5958                                      &lt;BR /&gt;
    104.42.231.28_32               0                                         &lt;BR /&gt;
    104.43.140.223_32              4723                                      &lt;BR /&gt;
    104.45.11.195_32               4789                                      &lt;BR /&gt;
    104.45.214.112_32              6963                                      &lt;BR /&gt;
    104.46.1.211_32                4596                                      &lt;BR /&gt;
    104.46.38.64_32                15503                                     &lt;BR /&gt;
    104.46.50.125_32               3617    &lt;BR /&gt;
 132.245.0.0_16                 106257                &lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Thu, 02 Jun 2016 21:13:00 GMT</pubDate>
    <dc:creator>Kyle_Buffington</dc:creator>
    <dc:date>2016-06-02T21:13:00Z</dc:date>
    <item>
      <title>ACL for Office365</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/acl-for-office365/m-p/17958#M677</link>
      <description>I am creating a ACL that basically blocks about 240+ M$ Office365 related IP addresses so that Websense will not block the traffic.  Web traffic is coming off of a VSS tap into my Summit X460 on port 47 and then I have that mirrored to port 48 going to the Websense server. I do not want Websense to see 240+ IP addresses so I created an ACL to deny. It seems VERY hit and miss whether this works or not. It seemed pretty straight forward to me. Here is an example of the list and my ACL setup. I had to put it on the egress port because the Mirror port kept doing it's thing before anything else if I tried putting it on the incoming port 47. It works pretty well but occasionally I can see Websense getting a packet to one of the below IPs and see the RST packet which in turn blocks the user from getting to &lt;A href="https://outlook.com" target="_blank" rel="nofollow noreferrer noopener"&gt;https://outlook.com&lt;/A&gt; or &lt;A href="https://outlook.office365.com" target="_blank" rel="nofollow noreferrer noopener"&gt;https://outlook.office365.com&lt;/A&gt; and various other M$ sites that have been defined to be denied. You so not see it in this snippit of the ACL but 132.245.0.0/16 is setup for outlook.office365.com &lt;BR /&gt;
&lt;BR /&gt;
Tap &amp;gt; Port 47 &amp;gt; Port 48 (Mirror) &amp;gt; Websense server&lt;BR /&gt;
&lt;BR /&gt;
configure ports 47 display-string From_Tap&lt;BR /&gt;
configure ports 48 display-string To_Websense&lt;BR /&gt;
configure mirror DefaultMirror to port 48 &lt;BR /&gt;
enable mirror DefaultMirror&lt;BR /&gt;
configure mirror DefaultMirror add port 47 ingress-and-egress&lt;BR /&gt;
&lt;BR /&gt;
configure access-list Office365-any ports 48 egress&lt;BR /&gt;
&lt;BR /&gt;
entry 65.55.150.61_32 { &lt;BR /&gt;
if match all { &lt;BR /&gt;
    destination-address 65.55.150.61/32 ;&lt;BR /&gt;
}&lt;BR /&gt;
then {&lt;BR /&gt;
    deny  ;&lt;BR /&gt;
    count 65.55.150.61_32 ;&lt;BR /&gt;
}&lt;BR /&gt;
}&lt;BR /&gt;
entry 65.55.150.160_32 { &lt;BR /&gt;
if match all { &lt;BR /&gt;
    destination-address 65.55.150.160/32 ;&lt;BR /&gt;
}&lt;BR /&gt;
then {&lt;BR /&gt;
    deny  ;&lt;BR /&gt;
    count 65.55.150.160_32 ;&lt;BR /&gt;
}&lt;BR /&gt;
}&lt;BR /&gt;
entry 134.170.52.122_32 { &lt;BR /&gt;
if match all { &lt;BR /&gt;
    destination-address 134.170.52.122/32 ;&lt;BR /&gt;
}&lt;BR /&gt;
then {&lt;BR /&gt;
    deny  ;&lt;BR /&gt;
    count 134.170.52.122_32 ;&lt;BR /&gt;
}&lt;BR /&gt;
}&lt;BR /&gt;
entry 134.170.52.123_32 { &lt;BR /&gt;
if match all { &lt;BR /&gt;
    destination-address 134.170.52.123/32 ;&lt;BR /&gt;
}&lt;BR /&gt;
then {&lt;BR /&gt;
    deny  ;&lt;BR /&gt;
    count 134.170.52.123_32 ;&lt;BR /&gt;
}&lt;BR /&gt;
}&lt;BR /&gt;
entry 134.170.52.124_32 { &lt;BR /&gt;
if match all { &lt;BR /&gt;
    destination-address 134.170.52.124/32 ;&lt;BR /&gt;
}&lt;BR /&gt;
then {&lt;BR /&gt;
    deny  ;&lt;BR /&gt;
    count 134.170.52.124_32 ;&lt;BR /&gt;
}&lt;BR /&gt;
}&lt;BR /&gt;
entry 157.56.138.141_32 { &lt;BR /&gt;
if match all { &lt;BR /&gt;
    destination-address 157.56.138.141/32 ;&lt;BR /&gt;
}&lt;BR /&gt;
then {&lt;BR /&gt;
    deny  ;&lt;BR /&gt;
    count 157.56.138.141_32 ;&lt;BR /&gt;
}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
This might not match the above ACL policy because I just took the first few instead of listing all of them but here is an example of the ACL hitting my counters.&lt;BR /&gt;
&lt;BR /&gt;
Policy Name       Vlan Name        Port   Direction      Counter Name                   Packet Count         Byte Count           &lt;BR /&gt;
==================================================================&lt;BR /&gt;
Office365-any     *                48     egress    &lt;BR /&gt;
    104.209.190.8_32               5638                                      &lt;BR /&gt;
    104.209.35.177_32              0                                         &lt;BR /&gt;
    104.210.212.243_32             4879                                      &lt;BR /&gt;
    104.210.4.77_32                2357                                      &lt;BR /&gt;
    104.210.40.87_32               4496                                      &lt;BR /&gt;
    104.214.35.244_32              7445                                      &lt;BR /&gt;
    104.215.146.200_32             3836                                      &lt;BR /&gt;
    104.215.198.144_32             6097                                      &lt;BR /&gt;
    104.41.207.73_32               5958                                      &lt;BR /&gt;
    104.42.231.28_32               0                                         &lt;BR /&gt;
    104.43.140.223_32              4723                                      &lt;BR /&gt;
    104.45.11.195_32               4789                                      &lt;BR /&gt;
    104.45.214.112_32              6963                                      &lt;BR /&gt;
    104.46.1.211_32                4596                                      &lt;BR /&gt;
    104.46.38.64_32                15503                                     &lt;BR /&gt;
    104.46.50.125_32               3617    &lt;BR /&gt;
 132.245.0.0_16                 106257                &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 02 Jun 2016 21:13:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/acl-for-office365/m-p/17958#M677</guid>
      <dc:creator>Kyle_Buffington</dc:creator>
      <dc:date>2016-06-02T21:13:00Z</dc:date>
    </item>
    <item>
      <title>RE: ACL for Office365</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/acl-for-office365/m-p/17959#M678</link>
      <description>It might be easier to create a ACL that will send the traffic you want to a mirror.&lt;BR /&gt;
&lt;BR /&gt;
entry &lt;NAME&gt; { &lt;BR /&gt;
if match all { &lt;BR /&gt;
    destination-address xx.xx.xx.xx/xx ;&lt;BR /&gt;
}&lt;BR /&gt;
then {&lt;BR /&gt;
    mirror &lt;EXOS_MIRROR_NAME&gt;;&lt;BR /&gt;
}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
What do you think?&lt;BR /&gt;
&lt;BR /&gt;&lt;/EXOS_MIRROR_NAME&gt;&lt;/NAME&gt;</description>
      <pubDate>Fri, 17 Jun 2016 22:20:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/acl-for-office365/m-p/17959#M678</guid>
      <dc:creator>StephenW</dc:creator>
      <dc:date>2016-06-17T22:20:00Z</dc:date>
    </item>
  </channel>
</rss>

