cancel
Showing results for 
Search instead for 
Did you mean: 

ACL Ingress/Egress when applied to a VLAN

ACL Ingress/Egress when applied to a VLAN

MattA
New Contributor
Hi Folks,

I'm having a hard time understanding when to apply an ACL as Ingress or Egress, specifically when applying it to a VLAN.

For example, I have a switch with 6 VLANs, and one of those VLANs is a guest network that shouldn't be able to access any other VLAN.

Would I apply those deny rules, within one ACL, as an Ingress on the Guest VLAN or an Egress?  Then an explicit permit at the end to allow for internet?

My initial thought was Egress, but I'm stumped after reading this article, How To: How To: Create and Apply an ACL in EXOS | Extreme Portal (force.com)

Thanks
Matt
5 REPLIES 5

estanicki
New Contributor

Gabriel,

 Bringing up an old thread but im looking at something similar. Im interested in creating an Allow ACL with a global Deny at the bottom for any non-defined subnets. When i do this i lose inter-vlan traffic. As an example

Looking over the syntax and having the information below
VLAN1 172.16.0.0/16
VLAN2 10.10.10.0/24
VLAN3 10.10.11.0/24
VLAN4 10.10.12.0/24
VLAN100 172.20.0.0/24
VLAN101 172.20.1.0/24
VLAN102 172.20.2.0/24

Im looking to allow vlan 100,101,102 to access vlan 1 but deny vlan 2, 3, 4.

Using the policy below bound as ingress on vlan1 i lose ping between vlan1 devices and i get trapped in the deny. This appears to be because while its inter-vlan traffic the packets still have layer3 headers and it dosent see the 'source' 'destination' match. How can i maintain inter-vlan traffic while maintaining a majorally 'allow' policy file.

entry VLAN100_to_VLAN1_Accept {
if match all {
source-address 172.20.0.0/24 ;
destination-address 172.16.0.0/16 ;
} then {
permit ;
} }

entry VLAN101_to_VLAN1_Accept {
if match all {
source-address 172.20.1.0/24 ;
destination-address 172.16.0.0/16 ;
} then {
permit ;
} }

entry VLAN102_to_VLAN1_Accept {
if match all {
source-address 172.20.2.0/24 ;
destination-address 172.16.0.0/16 ;
} then {
permit ;
} }

entry DenyOthers_to_VLAN1 {
if match all {
destination-address 172.16.0.0/16 ;
} then {
deny ;
} }

marconet_22
New Contributor III

Hi MattA

I have the same issue. I have VLAN8 like guest user and i need to block egress traffic to private networks. And it seems doesn't work.

but why? In Cisco, into every switch I can block ingress and egress traffic with Extended access list

Have you solved your issue?

Gabriel_G
Extreme Employee
Hey Matt,

For limiting client-to-client traffic in the same VLAN, I know of 2 features:
1) For wireless clients, there is usually a 'client-isolation' option on the WLC that prevents clients from talking to each other
2) For wired clients, you can use something call a private VLAN which forces traffic to an uplink port and not to any other client port.
Page 585
https://documentation.extremenetworks.com/exos_31.7/downloads/EXOS_User_Guide_31.7.pdf

MattA
New Contributor
Thanks @Gabriel_G that was very helpful. I was very confused with the ingress/egress logic however it clicked the other day as I was working with some test switches.

I'll need to brainstorm how to stop communications for clients on that VLAN locally, where an ACL is applied as ingress.  The VLANs will mainly be used for wireless, so I suspect the wireless controller has the option to isolate client traffic from each other.  

Thanks again! 
​​
GTM-P2G8KFN