<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wake on LAN in ExtremeSwitching (VSP/Fabric Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/wake-on-lan/m-p/99091#M2292</link>
    <description>&lt;P&gt;Ah. Sorry, my mistake. Hadn't had any coffee &lt;span class="lia-unicode-emoji" title=":face_with_tears_of_joy:"&gt;😂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Try this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;1. &lt;STRONG&gt;Define an ACL for WoL Filtering:&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;Create an ACL that permits WoL packets from a specific source IP address and denies others.&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;acl create "WoL_Filter"&lt;/PRE&gt;&lt;H3&gt;2. &lt;STRONG&gt;Configure ACL Rules:&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;Configure rules within the ACL to explicitly permit WoL packets from the specific source IP address and deny the rest. Remember, WoL packets usually use UDP and target port 7 or 9.&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN class=""&gt;# &lt;/SPAN&gt;&lt;SPAN class=""&gt;Permit WoL packets from a specific &lt;SPAN class=""&gt;source&lt;/SPAN&gt; IP&lt;/SPAN&gt;
acl rule-create "WoL_Filter" seq 10 action permit protocol udp src-ip &amp;lt;Specific_Source_IP&amp;gt;/32 src-port 0-65535 dst-ip &amp;lt;Broadcast_Address&amp;gt; dst-port 7-9
&lt;SPAN class=""&gt;# &lt;/SPAN&gt;&lt;SPAN class=""&gt;Deny other WoL packets (&lt;SPAN class=""&gt;if&lt;/SPAN&gt; necessary)&lt;/SPAN&gt;
acl rule-create "WoL_Filter" seq 20 action deny protocol udp src-ip any src-port 0-65535 dst-ip &amp;lt;Broadcast_Address&amp;gt; dst-port 7-9&lt;/PRE&gt;&lt;H3&gt;3. &lt;STRONG&gt;Apply the ACL to the Relevant VLAN or Interface:&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;Apply the ACL to the interface or VLAN where you want to filter the WoL packets.&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;PRE&gt;interface vlan &amp;lt;VLAN_ID&amp;gt;
ip access-group "WoL_Filter" in&lt;/PRE&gt;&lt;H3&gt;4. &lt;STRONG&gt;Validate the Configuration:&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;After applying the ACL, ensure that WoL functionality is working as expected. Verify that only WoL packets from the specified source are allowed and that all other WoL packets are blocked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 29 Jan 2024 18:55:15 GMT</pubDate>
    <dc:creator>Brent_Addis</dc:creator>
    <dc:date>2024-01-29T18:55:15Z</dc:date>
    <item>
      <title>Wake on LAN</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/wake-on-lan/m-p/98743#M2282</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Hello everyone, &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;I have a question about wake on lan. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;In XOS it was policy based. e.g.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;entry one {
        if match all {
                source-address 192.168.1.2/32;
                if match any {
                        destination-port 9 ;
                        destination-port 7 ;
                }
} then {
        vlan VLAN30 ;
}
}&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;I saw the VOSS example: &lt;A href="https://extreme-networks.my.site.com/ExtrArticleDetail?an=000111158" target="_blank" rel="noopener"&gt;https://extreme-networks.my.site.com/ExtrArticleDetail?an=000111158&lt;/A&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;but can I also filter for a specific source address?&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Thank you &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Many greetings Alexander&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 09:18:55 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/wake-on-lan/m-p/98743#M2282</guid>
      <dc:creator>x34743</dc:creator>
      <dc:date>2024-01-10T09:18:55Z</dc:date>
    </item>
    <item>
      <title>Re: Wake on LAN</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/wake-on-lan/m-p/99056#M2290</link>
      <description>&lt;P&gt;Yeah. You can.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;1. &lt;STRONG&gt;Define an ACL for WoL Filtering:&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;Create an ACL that permits WoL packets from a specific source IP address and denies others.&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;create access-list "WoL_Filter"&lt;/PRE&gt;&lt;H3&gt;2. &lt;STRONG&gt;Configure ACL Rules:&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;Configure rules within the ACL to explicitly permit WoL packets from the specific source IP address and deny the rest. WoL packets usually use UDP and target port 7 or 9.&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN class=""&gt;# &lt;/SPAN&gt;&lt;SPAN class=""&gt;Permit WoL packets from a specific &lt;SPAN class=""&gt;source&lt;/SPAN&gt; IP&lt;/SPAN&gt;
entry 10 {
    action permit
    from ip 
    source-ip &amp;lt;Specific_Source_IP&amp;gt;/32
    destination-port 7 9
    protocol udp
}
&lt;SPAN class=""&gt;# &lt;/SPAN&gt;&lt;SPAN class=""&gt;Implicit deny at the end (default behavior)&lt;/SPAN&gt;&lt;/PRE&gt;&lt;H3&gt;3. &lt;STRONG&gt;Apply the ACL to the Relevant Interface or VLAN:&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;Apply the ACL to the interface or VLAN where you want to filter the WoL packets.&lt;/P&gt;&lt;P&gt;For an interface:&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;configure interface &amp;lt;interface_name&amp;gt; ip access-group "WoL_Filter" in&lt;/PRE&gt;&lt;P&gt;For a VLAN:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;configure vlan &amp;lt;vlan_name&amp;gt; ip access-group "WoL_Filter" in&lt;/PRE&gt;&lt;H3&gt;4. &lt;STRONG&gt;Validate the Configuration:&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;After applying the ACL, ensure that WoL functionality is working as expected. Verify that only WoL packets from the specified source are allowed and that all other WoL packets are blocked.&lt;/P&gt;&lt;H3&gt;5. &lt;STRONG&gt;Monitoring and Logging (Optional):&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;Consider enabling logging for the ACL to monitor the packets being permitted or denied. This can help in troubleshooting and ensuring that the ACL is working as intended.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;configure log filter "WoL_Filter" add entry 10&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jan 2024 19:28:44 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/wake-on-lan/m-p/99056#M2290</guid>
      <dc:creator>Brent_Addis</dc:creator>
      <dc:date>2024-01-28T19:28:44Z</dc:date>
    </item>
    <item>
      <title>Re: Wake on LAN</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/wake-on-lan/m-p/99081#M2291</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Hi Brent, &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;thank you very much for your answer.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;But your solution is also for XOS?&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;However, I am looking to implement this solution in VOSS.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;For Voss I only found the example from Extreme, where you have to allow the entire VLAN and cannot limit it to a source address.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 13:50:08 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/wake-on-lan/m-p/99081#M2291</guid>
      <dc:creator>x34743</dc:creator>
      <dc:date>2024-01-29T13:50:08Z</dc:date>
    </item>
    <item>
      <title>Re: Wake on LAN</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/wake-on-lan/m-p/99091#M2292</link>
      <description>&lt;P&gt;Ah. Sorry, my mistake. Hadn't had any coffee &lt;span class="lia-unicode-emoji" title=":face_with_tears_of_joy:"&gt;😂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Try this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;1. &lt;STRONG&gt;Define an ACL for WoL Filtering:&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;Create an ACL that permits WoL packets from a specific source IP address and denies others.&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;acl create "WoL_Filter"&lt;/PRE&gt;&lt;H3&gt;2. &lt;STRONG&gt;Configure ACL Rules:&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;Configure rules within the ACL to explicitly permit WoL packets from the specific source IP address and deny the rest. Remember, WoL packets usually use UDP and target port 7 or 9.&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN class=""&gt;# &lt;/SPAN&gt;&lt;SPAN class=""&gt;Permit WoL packets from a specific &lt;SPAN class=""&gt;source&lt;/SPAN&gt; IP&lt;/SPAN&gt;
acl rule-create "WoL_Filter" seq 10 action permit protocol udp src-ip &amp;lt;Specific_Source_IP&amp;gt;/32 src-port 0-65535 dst-ip &amp;lt;Broadcast_Address&amp;gt; dst-port 7-9
&lt;SPAN class=""&gt;# &lt;/SPAN&gt;&lt;SPAN class=""&gt;Deny other WoL packets (&lt;SPAN class=""&gt;if&lt;/SPAN&gt; necessary)&lt;/SPAN&gt;
acl rule-create "WoL_Filter" seq 20 action deny protocol udp src-ip any src-port 0-65535 dst-ip &amp;lt;Broadcast_Address&amp;gt; dst-port 7-9&lt;/PRE&gt;&lt;H3&gt;3. &lt;STRONG&gt;Apply the ACL to the Relevant VLAN or Interface:&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;Apply the ACL to the interface or VLAN where you want to filter the WoL packets.&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;PRE&gt;interface vlan &amp;lt;VLAN_ID&amp;gt;
ip access-group "WoL_Filter" in&lt;/PRE&gt;&lt;H3&gt;4. &lt;STRONG&gt;Validate the Configuration:&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;After applying the ACL, ensure that WoL functionality is working as expected. Verify that only WoL packets from the specified source are allowed and that all other WoL packets are blocked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 18:55:15 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/wake-on-lan/m-p/99091#M2292</guid>
      <dc:creator>Brent_Addis</dc:creator>
      <dc:date>2024-01-29T18:55:15Z</dc:date>
    </item>
  </channel>
</rss>

