Create Date: Jun 20 2012 8:32AM
Hi Prusso, thanks for your answer, it makes sense.
I came to the same conclusion: i need to create as many ACL as there are networks.
I hoped that there could be another way, because I have a lot of networks. Also the network addressing scheme will evolve in the future, some networks can be added or modified, and I or other admins will always have to remember to update the ACLs accordingly, which is a recipe for security holes.
i tried to imagine a way with two ACL configured for all ports, which would drop all packets with source or destination in the isolated vlan, but this would require being able to negate a match in the ACL syntax, something like:
entry block-to-isolated {
if {
source-address 2.2.2.0/24;
destination-address NOT 2.2.2.0/24;
} then {
deny;
}
}
entry block-from-isolated {
if {
destination-address 2.2.2.0/24;
source-address NOT 2.2.2.0/24;
} then {
deny;
}
}
indeed it seems i'm stuck with the "as many ACL as networks" solution (i don't say "as many ACL as vlans" because i have more networks than vlans)
Matthieu
(from matthieu_imbert)