<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VSP and ACL's (and some XMC) in ExtremeSwitching (VSP/Fabric Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91222#M1812</link>
    <description>First time poster. A few questions, but related. All VSP's are running VOSS 8.4.3.0&lt;BR /&gt;&lt;BR /&gt;1. I'm trying to limit access to the some ERS switch IP addresses using ACL's. The switches IP addresses are in a VLan. So far, I have IP's of permitted users (network admins), IP's of XMC/NAC servers, deny everybody else. Because these switches have EAP enabled ports, I think I also need to permit IP's of DHCP servers. We are a Windows shop, so do I also need IP's of Active domain controllers/DNS servers?&lt;BR /&gt;&lt;BR /&gt;2. I'm also trying to limit access to VSP switches, also using ACL's. These have CLIP addresses, and are not part of a VLan. Here are the first few lines of a regular inVlan ACL (in docs that I have seen so far).&lt;BR /&gt;&lt;BR /&gt;filter acl 10 type invlan name "Limit access to VSP"&lt;BR /&gt;filter acl vlan 10 &amp;lt;vlan number&amp;gt;&lt;BR /&gt;filter acl ace 10 10 ...&lt;BR /&gt;&lt;BR /&gt;Since the CLIP addresses are not part of a VLan, should I skip the 2nd line? Or leave it in with a dummy vlan number?&lt;BR /&gt;&lt;BR /&gt;3. Finally, is there some good documentation on VOSS ACL's? I'm aware of https://download.avaya.com/css/public/documents/101008810, but wondering if there is an updated version? Or is there an Extreme/other course about this?&lt;BR /&gt;&lt;BR /&gt;Thanks for any help.</description>
    <pubDate>Tue, 12 Apr 2022 17:34:51 GMT</pubDate>
    <dc:creator>XTRMUser</dc:creator>
    <dc:date>2022-04-12T17:34:51Z</dc:date>
    <item>
      <title>VSP and ACL's (and some XMC)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91222#M1812</link>
      <description>First time poster. A few questions, but related. All VSP's are running VOSS 8.4.3.0&lt;BR /&gt;&lt;BR /&gt;1. I'm trying to limit access to the some ERS switch IP addresses using ACL's. The switches IP addresses are in a VLan. So far, I have IP's of permitted users (network admins), IP's of XMC/NAC servers, deny everybody else. Because these switches have EAP enabled ports, I think I also need to permit IP's of DHCP servers. We are a Windows shop, so do I also need IP's of Active domain controllers/DNS servers?&lt;BR /&gt;&lt;BR /&gt;2. I'm also trying to limit access to VSP switches, also using ACL's. These have CLIP addresses, and are not part of a VLan. Here are the first few lines of a regular inVlan ACL (in docs that I have seen so far).&lt;BR /&gt;&lt;BR /&gt;filter acl 10 type invlan name "Limit access to VSP"&lt;BR /&gt;filter acl vlan 10 &amp;lt;vlan number&amp;gt;&lt;BR /&gt;filter acl ace 10 10 ...&lt;BR /&gt;&lt;BR /&gt;Since the CLIP addresses are not part of a VLan, should I skip the 2nd line? Or leave it in with a dummy vlan number?&lt;BR /&gt;&lt;BR /&gt;3. Finally, is there some good documentation on VOSS ACL's? I'm aware of https://download.avaya.com/css/public/documents/101008810, but wondering if there is an updated version? Or is there an Extreme/other course about this?&lt;BR /&gt;&lt;BR /&gt;Thanks for any help.</description>
      <pubDate>Tue, 12 Apr 2022 17:34:51 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91222#M1812</guid>
      <dc:creator>XTRMUser</dc:creator>
      <dc:date>2022-04-12T17:34:51Z</dc:date>
    </item>
    <item>
      <title>Re: VSP and ACL's (and some XMC)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91223#M1813</link>
      <description>In response to #1, I went about solving this the other way. After the IP's of permitted users and XMC/NAC, I'm blocking ports 21,22,23,80,443 and UDP 161. This allows regular EAP traffic, but blocks control access of the switches (which is what I'm after). Unless I missed a port.&lt;BR /&gt;&lt;BR /&gt;I still don't know what do about #2 and #3. Any help is appreciated.​​​</description>
      <pubDate>Thu, 14 Apr 2022 23:44:05 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91223#M1813</guid>
      <dc:creator>XTRMUser</dc:creator>
      <dc:date>2022-04-14T23:44:05Z</dc:date>
    </item>
    <item>
      <title>Re: VSP and ACL's (and some XMC)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91224#M1814</link>
      <description>Hey there, thanks for your patience while we looked in to this. I would recommend checking out the Traffic Filtering section of the VOSS User Guide for help with 2 and 3.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://documentation.extremenetworks.com/VOSS/SW/86/VOSSUserGuide/GUID-2B0AC0B6-E410-4E99-8C5F-EF143470E280.shtml#GUID-2B0AC0B6-E410-4E99-8C5F-EF143470E280" target="_blank" rel="noopener"&gt;8.6 VOSS User Guide&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://documentation.extremenetworks.com/VOSS/SW/84/VOSSUserGuide/GUID-2B62FE61-43B6-4421-91A7-D09D57097A42.shtml" target="_blank" rel="noopener"&gt;8.4 VOSS User Guide&lt;/A&gt;</description>
      <pubDate>Mon, 02 May 2022 14:32:29 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91224#M1814</guid>
      <dc:creator>SamPirok</dc:creator>
      <dc:date>2022-05-02T14:32:29Z</dc:date>
    </item>
    <item>
      <title>Re: VSP and ACL's (and some XMC)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91225#M1815</link>
      <description>For (2), if you are trying to limit management access to the VSP, you should be looking at the access-policy configuration, rather than ACLs.</description>
      <pubDate>Tue, 03 May 2022 12:27:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91225#M1815</guid>
      <dc:creator>Ludovico_Steven</dc:creator>
      <dc:date>2022-05-03T12:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: VSP and ACL's (and some XMC)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91226#M1816</link>
      <description>Thanks Sam and Ludovico. I'll pursue these avenues more.</description>
      <pubDate>Tue, 03 May 2022 16:51:59 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91226#M1816</guid>
      <dc:creator>XTRMUser</dc:creator>
      <dc:date>2022-05-03T16:51:59Z</dc:date>
    </item>
    <item>
      <title>Re: VSP and ACL's (and some XMC)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91227#M1817</link>
      <description>Did some digging and experimentation. access-policy will do great, except...&lt;BR /&gt;&lt;BR /&gt;There are 5 services/ports that a VSP switch has open (according to nmap). 4 of them are listed in the access-policy to permit/deny. The missing one is https. So to limit access to a VSP switch, when I can't stop https:, is lacking. The only VSP commands I see are:&lt;BR /&gt;&lt;BR /&gt;web-server enable&lt;BR /&gt;no web-server secure-only&lt;BR /&gt;&lt;BR /&gt;We can limit http using access-policy, but not https. The only option is to disable web-server totally, but it is nice to use EDM, which requires web-server &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Any thoughts???&lt;BR /&gt;&lt;BR /&gt;Thanks.</description>
      <pubDate>Thu, 05 May 2022 00:38:45 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91227#M1817</guid>
      <dc:creator>XTRMUser</dc:creator>
      <dc:date>2022-05-05T00:38:45Z</dc:date>
    </item>
    <item>
      <title>Re: VSP and ACL's (and some XMC)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91228#M1818</link>
      <description>Raised with product management the fact that we are missing https in access-policies at the moment. As this is an easy change, it looks like this will be added in a future release.</description>
      <pubDate>Wed, 11 May 2022 16:27:51 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91228#M1818</guid>
      <dc:creator>Ludovico_Steven</dc:creator>
      <dc:date>2022-05-11T16:27:51Z</dc:date>
    </item>
    <item>
      <title>Re: VSP and ACL's (and some XMC)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91229#M1819</link>
      <description>It appears (with early limited testing) that blocking HTTPS is done with HTTP. In other words, by denying/permitting HTTP, HTTPS is also denied/permitted. But it would be nice to have it explicitly shown.</description>
      <pubDate>Wed, 11 May 2022 22:33:58 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91229#M1819</guid>
      <dc:creator>XTRMUser</dc:creator>
      <dc:date>2022-05-11T22:33:58Z</dc:date>
    </item>
    <item>
      <title>Re: VSP and ACL's (and some XMC)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91230#M1820</link>
      <description>Yes, I also tested it. So, thinking about this again, if the access-policy "http" protocol allows or denies both of http &amp;amp; https at the same time, then this means that it does actually work for https. So the question now is whether there is any value in using access-policies to allow some users to access the web interface with HTTP and other users with HTTPS. And I don't quite see a use case for that. You probably want allow http/https, as you can do today, and then simply set the web-server to only operate with HTTPS. Why change the existing behaviour ?&lt;BR /&gt;Note that RESTCONF is using a different HTTP stack internally, hence the use of a different 8080 port number. So we would probably simply add "restconf" as another option under access-policies.</description>
      <pubDate>Fri, 13 May 2022 10:06:52 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/vsp-and-acl-s-and-some-xmc/m-p/91230#M1820</guid>
      <dc:creator>Ludovico_Steven</dc:creator>
      <dc:date>2022-05-13T10:06:52Z</dc:date>
    </item>
  </channel>
</rss>

