09-27-2018 03:31 PM
We don't allow non-company owned assets from connecting to our network, but have a need to allow a vendor to connect to our network for the purpose of managing our phone system. When we had our Cisco switches, I would allow access to that subnet but then block all RFC1819 addresses. I'm having trouble doing that with our new Summit switches.
I used the following as a guide to build my configuration as such.
https://extremeportal.force.com/ExtrArticleDetail?an=000061806
entry PermitVendor {
if match all {
destination-address 192.168.100.0/24 ;
}
then {
permit ;
}
}
entry DenyRFC1817 {
if match any {
destination-address 192.168.0.0/16 ;
destination-address 172.16.0.0/12 ;
destination-address 10.0.0.0/8 ;
}
then {
deny ;
}
}
This policy doesn't work- there are 2 issues.
First, this policy doesn't pass muster because it has multiple destination-address statement. How can I use as few lines of code to achieve my goals of denying all private address communications.
Secondly, if I tell it to block 192.168.0.0/16 my permit policy from above doesn't work. It works if I deny to 192.168.200.0/24- I can only assume that I'm permitting the 192.168.100.0/24 but then immediately denying it with the 192.168.0.0/16...
Third, I didn't outline here but I need them to get to the Internet which means they need to use my internal DNS. So I need to create another rule that will allow port 53 traffic to my DNS hosts.
Thanks!
09-27-2018 05:39 PM
09-27-2018 03:55 PM