<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Transit ACL on L3 routing switch in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/transit-acl-on-l3-routing-switch/m-p/19024#M923</link>
    <description>Does anyone happen to have a transit ACL on a publicly routed ExOS switch?&lt;BR /&gt;
&lt;BR /&gt;
I'm using an X440 stack as an internet gateway for a customer. &lt;BR /&gt;
&lt;BR /&gt;
I did create an access profile for all of the management profiles only permitting certain IP ranges to gain access. &lt;BR /&gt;
&lt;BR /&gt;
I'm just looking for an ACL that will block SSH and port scans and what not from even discovering the gateway IP. &lt;BR /&gt;
&lt;BR /&gt;
The SSH attempts fill the logs up. If I do a port scan on the router this comes up:&lt;BR /&gt;
      21/tcp   open     ftp&lt;BR /&gt;
&lt;BR /&gt;
  22/tcp   open     ssh&lt;BR /&gt;
&lt;BR /&gt;
  113/tcp  filtered ident&lt;BR /&gt;
&lt;BR /&gt;
  135/tcp  filtered msrpc&lt;BR /&gt;
&lt;BR /&gt;
  139/tcp  open     netbios-ssn&lt;BR /&gt;
&lt;BR /&gt;
  445/tcp  open     microsoft-ds&lt;BR /&gt;
&lt;BR /&gt;
  554/tcp  open     rtsp&lt;BR /&gt;
&lt;BR /&gt;
  593/tcp  filtered http-rpc-epmap&lt;BR /&gt;
&lt;BR /&gt;
  7070/tcp open     realserver&lt;BR /&gt;
&lt;BR /&gt;
I dont mind if it responds to ICMP. I just want everything else locked down. &lt;BR /&gt;
&lt;BR /&gt;
If you have a transit ACL template I'd love a copy! Obviously I dont want to block ipforwarding or any protocols on any hosts after the router.</description>
    <pubDate>Thu, 19 Oct 2017 23:17:00 GMT</pubDate>
    <dc:creator>John_Barfield</dc:creator>
    <dc:date>2017-10-19T23:17:00Z</dc:date>
    <item>
      <title>Transit ACL on L3 routing switch</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/transit-acl-on-l3-routing-switch/m-p/19024#M923</link>
      <description>Does anyone happen to have a transit ACL on a publicly routed ExOS switch?&lt;BR /&gt;
&lt;BR /&gt;
I'm using an X440 stack as an internet gateway for a customer. &lt;BR /&gt;
&lt;BR /&gt;
I did create an access profile for all of the management profiles only permitting certain IP ranges to gain access. &lt;BR /&gt;
&lt;BR /&gt;
I'm just looking for an ACL that will block SSH and port scans and what not from even discovering the gateway IP. &lt;BR /&gt;
&lt;BR /&gt;
The SSH attempts fill the logs up. If I do a port scan on the router this comes up:&lt;BR /&gt;
      21/tcp   open     ftp&lt;BR /&gt;
&lt;BR /&gt;
  22/tcp   open     ssh&lt;BR /&gt;
&lt;BR /&gt;
  113/tcp  filtered ident&lt;BR /&gt;
&lt;BR /&gt;
  135/tcp  filtered msrpc&lt;BR /&gt;
&lt;BR /&gt;
  139/tcp  open     netbios-ssn&lt;BR /&gt;
&lt;BR /&gt;
  445/tcp  open     microsoft-ds&lt;BR /&gt;
&lt;BR /&gt;
  554/tcp  open     rtsp&lt;BR /&gt;
&lt;BR /&gt;
  593/tcp  filtered http-rpc-epmap&lt;BR /&gt;
&lt;BR /&gt;
  7070/tcp open     realserver&lt;BR /&gt;
&lt;BR /&gt;
I dont mind if it responds to ICMP. I just want everything else locked down. &lt;BR /&gt;
&lt;BR /&gt;
If you have a transit ACL template I'd love a copy! Obviously I dont want to block ipforwarding or any protocols on any hosts after the router.</description>
      <pubDate>Thu, 19 Oct 2017 23:17:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/transit-acl-on-l3-routing-switch/m-p/19024#M923</guid>
      <dc:creator>John_Barfield</dc:creator>
      <dc:date>2017-10-19T23:17:00Z</dc:date>
    </item>
    <item>
      <title>RE: Transit ACL on L3 routing switch</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/transit-acl-on-l3-routing-switch/m-p/19025#M924</link>
      <description>Hi John,&lt;BR /&gt;
&lt;BR /&gt;
I do not have an example, but can try to describe the general idea I would use: you could create an ACL that denies anything you do not need (you might want to allow ICMP) directed &lt;I&gt;at the gateway IP&lt;/I&gt; (both v4 and v6 if applicable) and bind this to your outside interface. Traffic through the router is never sent to the router (if it is sent to the router, it is not passed on to other devices).&lt;BR /&gt;
&lt;BR /&gt;
I would suggest you look into using the management port (VR-Mgmt) for management and restricting all management protocols to use that VR.&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
Erik</description>
      <pubDate>Fri, 20 Oct 2017 12:57:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/transit-acl-on-l3-routing-switch/m-p/19025#M924</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2017-10-20T12:57:00Z</dc:date>
    </item>
  </channel>
</rss>

