05-05-2022 10:53 AM
3 weeks ago - last edited 3 weeks ago
Gabriel,
Bringing up an old thread but im looking at something similar. Im interested in creating an Allow ACL with a global Deny at the bottom for any non-defined subnets. When i do this i lose inter-vlan traffic. As an example
Looking over the syntax and having the information below
VLAN1 172.16.0.0/16
VLAN2 10.10.10.0/24
VLAN3 10.10.11.0/24
VLAN4 10.10.12.0/24
VLAN100 172.20.0.0/24
VLAN101 172.20.1.0/24
VLAN102 172.20.2.0/24
Im looking to allow vlan 100,101,102 to access vlan 1 but deny vlan 2, 3, 4.
Using the policy below bound as ingress on vlan1 i lose ping between vlan1 devices and i get trapped in the deny. This appears to be because while its inter-vlan traffic the packets still have layer3 headers and it dosent see the 'source' 'destination' match. How can i maintain inter-vlan traffic while maintaining a majorally 'allow' policy file.
entry VLAN100_to_VLAN1_Accept {
if match all {
source-address 172.20.0.0/24 ;
destination-address 172.16.0.0/16 ;
} then {
permit ;
} }
entry VLAN101_to_VLAN1_Accept {
if match all {
source-address 172.20.1.0/24 ;
destination-address 172.16.0.0/16 ;
} then {
permit ;
} }
entry VLAN102_to_VLAN1_Accept {
if match all {
source-address 172.20.2.0/24 ;
destination-address 172.16.0.0/16 ;
} then {
permit ;
} }
entry DenyOthers_to_VLAN1 {
if match all {
destination-address 172.16.0.0/16 ;
} then {
deny ;
} }
11-24-2022 01:55 AM
Hi MattA
I have the same issue. I have VLAN8 like guest user and i need to block egress traffic to private networks. And it seems doesn't work.
but why? In Cisco, into every switch I can block ingress and egress traffic with Extended access list
Have you solved your issue?
05-12-2022 03:31 PM
05-12-2022 02:00 PM