cancel
Showing results for 
Search instead for 
Did you mean: 

ACL one way

ACL one way

Kamal_FIKRI
New Contributor
Hello,
I need to create an access list based on subnet IP source and destination and applied in a VLAN interface, the ACL work fine when we need to block all traffic, but when we try to block the traffic in one way like reflexive ACL in Cisco it doesn't work, here is my ACL:
entry DenyInterVlanRouting {
if match all {
source-address 10.10.1.110/32;
destination-address 10.10.128.245/32;
}
then {
deny ;
}
}
I want to block only from 10.10.1.110 to 10.10.128.245 and allow in the return path.
10 REPLIES 10

Senguttuvan__Ar
Extreme Employee
How are you validating that the traffic with source 10.10.128.20 and destination 10.10.10.58 are getting forwarded to the device properly when the return traffic is blocked.

Do you have any other rule in the policy apart from the deny rule?

Could you create a new policy with following rule:

entry permit {
if match all {
source-address 10.10.128.20/32;
destination-address 10.10.10.58/32;
}
then{
permit;
}
}

and apply as ingress on VLAN 128 and verify if it works.

Kamal_FIKRI
New Contributor
Hi,
I have a summit L3 as core switch with multiple Vlan, the vlan interface 128 have IP 10.10.128.1/24 and is the gateway for 10.10.128.20 and the 10.10.10.58 is in the default vlan

Senguttuvan__Ar
Extreme Employee
Hi Kamal,

I am sorry, I missed the part that you are applying this policy on a VLAN and in ingress direction.

I would like to know following information:

1. On which VLAN this IP resides 10.10.128.20/32;? I believe the IP 10.10.10.58 is on VLAN Default right?
2. How are you validating that the traffic with source 10.10.128.20 and destination 10.10.10.58 are getting forwarded to the device properly when the return traffic is blocked.
3. What are the ports these devices are connected to on the switch?

Regards,
Arun

Kamal_FIKRI
New Contributor
Note: I changed IP address for test

Kamal_FIKRI
New Contributor
Hi Senguttuvan,
Thank's for the replay,
I tried this one, but the traffic still dropped in both way, here is my new ACL:

entry DenyVlanDefault {
if match all {
source-address 10.10.10.58/32;
destination-address 10.10.128.20/32;
}then{
deny;
}
}
entry permit {
if match all {
source-address 10.10.128.20/32;
destination-address 10.10.10.58/32;
}
then{
permit;
}
}

I apply it in Default vlan interface ingress

GTM-P2G8KFN