<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACL Ingress/Egress when applied to a VLAN in ExtremeSwitching (Other)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-other/acl-ingress-egress-when-applied-to-a-vlan/m-p/77107#M3825</link>
    <description>Hey Matt,&lt;BR /&gt;&lt;BR /&gt;For limiting client-to-client traffic in the same VLAN, I know of 2 features:&lt;BR /&gt;1) For wireless clients, there is usually a 'client-isolation' option on the WLC that prevents clients from talking to each other&lt;BR /&gt;2) For wired clients, you can use something call a private VLAN which forces traffic to an uplink port and not to any other client port.&lt;BR /&gt;Page 585&lt;BR /&gt;&lt;SPAN class="prokeys-snippet-text"&gt;https://documentation.extremenetworks.com/exos_31.7/downloads/EXOS_User_Guide_31.7.pdf&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;</description>
    <pubDate>Thu, 12 May 2022 22:31:39 GMT</pubDate>
    <dc:creator>Gabriel_G</dc:creator>
    <dc:date>2022-05-12T22:31:39Z</dc:date>
    <item>
      <title>ACL Ingress/Egress when applied to a VLAN</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-other/acl-ingress-egress-when-applied-to-a-vlan/m-p/77104#M3822</link>
      <description>Hi Folks,&lt;BR /&gt;&lt;BR /&gt;I'm having a hard time understanding when to apply an ACL as Ingress or Egress, specifically when applying it to a VLAN.&lt;BR /&gt;&lt;BR /&gt;For example, I have a switch with 6 VLANs, and one of those VLANs is a guest network that shouldn't be able to access any other VLAN.&lt;BR /&gt;&lt;BR /&gt;Would I apply those deny rules, within one ACL, as an Ingress on the Guest VLAN or an Egress?&amp;nbsp; Then an explicit permit at the end to allow for internet?&lt;BR /&gt;&lt;BR /&gt;My initial thought was Egress, but I'm stumped after reading this article, &lt;A href="https://extremeportal.force.com/ExtrArticleDetail?an=000083345&amp;amp;q=ACLs" target="_blank" rel="noopener"&gt;How To: How To: Create and Apply an ACL in EXOS | Extreme Portal (force.com)&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;Matt</description>
      <pubDate>Thu, 05 May 2022 17:53:17 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-other/acl-ingress-egress-when-applied-to-a-vlan/m-p/77104#M3822</guid>
      <dc:creator>MattA</dc:creator>
      <dc:date>2022-05-05T17:53:17Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Ingress/Egress when applied to a VLAN</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-other/acl-ingress-egress-when-applied-to-a-vlan/m-p/77105#M3823</link>
      <description>&lt;P&gt;Hi Matt,&lt;BR /&gt;&lt;BR /&gt;When applying ACLs to a VLAN, that is effectively the same thing as applying the ACL to all ports that belong to that VLAN. Note that ACLs applied to a VLAN do not touch traffic that is routed into or out-of that VLAN locally.&lt;BR /&gt;&lt;BR /&gt;In EXOS, it's generally easier to apply ingress ACLs vs Egress ACLs as Egress ACLs have more restrictions, less hardware availability, and egress ACLs are not supported on all platforms.&lt;BR /&gt;&lt;BR /&gt;If you're trying to prevent client A from reaching things in network B, it's generally acceptable to apply an INGRESS ACL on the client port, or as close to the client as possible to reduce how far that traffic goes before it's dropped. Alternatively, you could use an EGRESS ACL at the router for network B if you're unsure of where traffic will be ingressing.&lt;/P&gt;
&lt;P&gt;
&lt;/P&gt;&lt;P&gt;Regarding your specific example:&lt;BR /&gt;I would apply an ingress ACL to the guest VLAN with a bunch of deny rules that prevents those clients from reaching other networks (via destination-address match condition). Then the permit all at the end will allow for Internet traffic as you suggested.&lt;BR /&gt;&lt;BR /&gt;Hope that helps!&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2022 20:05:21 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-other/acl-ingress-egress-when-applied-to-a-vlan/m-p/77105#M3823</guid>
      <dc:creator>Gabriel_G</dc:creator>
      <dc:date>2022-05-12T20:05:21Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Ingress/Egress when applied to a VLAN</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-other/acl-ingress-egress-when-applied-to-a-vlan/m-p/77106#M3824</link>
      <description>Thanks &lt;A class="user-content-mention" data-sign="@" data-contactkey="5064e7bf-aeaa-4efb-af47-1365fc8556c7" data-tag-text="@Gabriel_G" href="https://community.extremenetworks.com/network/members/profile?UserKey=5064e7bf-aeaa-4efb-af47-1365fc8556c7" data-itemmentionkey="ea1af6fb-cc14-4dde-9fd7-0800b42638cf"&gt;@Gabriel_G&lt;/A&gt; that was very helpful. I was very confused with the ingress/egress logic however it clicked the other day as I was working with some test switches.&lt;BR /&gt;&lt;BR /&gt;I'll need to brainstorm how to stop communications for clients on that VLAN locally, where an ACL is applied as ingress.&amp;nbsp; The VLANs will mainly be used for wireless, so I suspect the wireless controller has the option to isolate client traffic from each other.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thanks again!&amp;nbsp;&lt;BR /&gt;​​</description>
      <pubDate>Thu, 12 May 2022 21:00:34 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-other/acl-ingress-egress-when-applied-to-a-vlan/m-p/77106#M3824</guid>
      <dc:creator>MattA</dc:creator>
      <dc:date>2022-05-12T21:00:34Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Ingress/Egress when applied to a VLAN</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-other/acl-ingress-egress-when-applied-to-a-vlan/m-p/77107#M3825</link>
      <description>Hey Matt,&lt;BR /&gt;&lt;BR /&gt;For limiting client-to-client traffic in the same VLAN, I know of 2 features:&lt;BR /&gt;1) For wireless clients, there is usually a 'client-isolation' option on the WLC that prevents clients from talking to each other&lt;BR /&gt;2) For wired clients, you can use something call a private VLAN which forces traffic to an uplink port and not to any other client port.&lt;BR /&gt;Page 585&lt;BR /&gt;&lt;SPAN class="prokeys-snippet-text"&gt;https://documentation.extremenetworks.com/exos_31.7/downloads/EXOS_User_Guide_31.7.pdf&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;</description>
      <pubDate>Thu, 12 May 2022 22:31:39 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-other/acl-ingress-egress-when-applied-to-a-vlan/m-p/77107#M3825</guid>
      <dc:creator>Gabriel_G</dc:creator>
      <dc:date>2022-05-12T22:31:39Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Ingress/Egress when applied to a VLAN</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-other/acl-ingress-egress-when-applied-to-a-vlan/m-p/93862#M4046</link>
      <description>&lt;P&gt;Hi MattA&lt;/P&gt;&lt;P&gt;I have the same issue. I have VLAN8 like guest user and i need to block egress traffic to private networks. And it seems doesn't work.&lt;/P&gt;&lt;P&gt;but why? In Cisco, into every switch I can block ingress and egress traffic with Extended access list&lt;/P&gt;&lt;P&gt;Have you solved your issue?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 09:55:29 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-other/acl-ingress-egress-when-applied-to-a-vlan/m-p/93862#M4046</guid>
      <dc:creator>marconet_22</dc:creator>
      <dc:date>2022-11-24T09:55:29Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Ingress/Egress when applied to a VLAN</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-other/acl-ingress-egress-when-applied-to-a-vlan/m-p/117821#M4247</link>
      <description>&lt;P&gt;Gabriel,&lt;/P&gt;&lt;P&gt;&amp;nbsp;Bringing up an old thread but im looking at something similar. Im interested in creating an Allow ACL with a global Deny at the bottom for any non-defined subnets. When i do this i lose inter-vlan traffic. As an example&lt;/P&gt;&lt;P&gt;Looking over the syntax and having the information below&lt;BR /&gt;VLAN1 172.16.0.0/16&lt;BR /&gt;VLAN2 10.10.10.0/24&lt;BR /&gt;VLAN3 10.10.11.0/24&lt;BR /&gt;VLAN4 10.10.12.0/24&lt;BR /&gt;VLAN100 172.20.0.0/24&lt;BR /&gt;VLAN101 172.20.1.0/24&lt;BR /&gt;VLAN102 172.20.2.0/24&lt;/P&gt;&lt;P&gt;Im looking to allow vlan 100,101,102 to access vlan 1 but deny vlan 2, 3, 4.&lt;/P&gt;&lt;P&gt;Using the policy below bound as ingress on vlan1 i lose ping between vlan1 devices and i get trapped in the deny. This appears to be because while its inter-vlan traffic the packets still have layer3 headers and it dosent see the 'source' 'destination' match. How can i maintain inter-vlan traffic while maintaining a majorally 'allow' policy file.&lt;/P&gt;&lt;P&gt;entry VLAN100_to_VLAN1_Accept {&lt;BR /&gt;if match all {&lt;BR /&gt;source-address 172.20.0.0/24 ;&lt;BR /&gt;destination-address 172.16.0.0/16 ;&lt;BR /&gt;} then {&lt;BR /&gt;permit ;&lt;BR /&gt;} }&lt;/P&gt;&lt;P&gt;entry VLAN101_to_VLAN1_Accept {&lt;BR /&gt;if match all {&lt;BR /&gt;source-address 172.20.1.0/24 ;&lt;BR /&gt;destination-address 172.16.0.0/16 ;&lt;BR /&gt;} then {&lt;BR /&gt;permit ;&lt;BR /&gt;} }&lt;/P&gt;&lt;P&gt;entry VLAN102_to_VLAN1_Accept {&lt;BR /&gt;if match all {&lt;BR /&gt;source-address 172.20.2.0/24 ;&lt;BR /&gt;destination-address 172.16.0.0/16 ;&lt;BR /&gt;} then {&lt;BR /&gt;permit ;&lt;BR /&gt;} }&lt;/P&gt;&lt;P&gt;entry DenyOthers_to_VLAN1 {&lt;BR /&gt;if match all {&lt;BR /&gt;destination-address 172.16.0.0/16 ;&lt;BR /&gt;} then {&lt;BR /&gt;deny ;&lt;BR /&gt;} }&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2025 13:40:55 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-other/acl-ingress-egress-when-applied-to-a-vlan/m-p/117821#M4247</guid>
      <dc:creator>estanicki</dc:creator>
      <dc:date>2025-02-11T13:40:55Z</dc:date>
    </item>
  </channel>
</rss>

