Hi Aviv,
let me show something then:
VX(config-ip-acl-NO-ICMP)#show context
ip access-list NO-ICMP
deny icmp any any rule-precedence 5 VX(config-profile-default-ap7562-if-ge1)#show context
interface ge1
switchport mode trunk
switchport trunk native vlan 88
no switchport trunk native tagged
switchport trunk allowed vlan 88,99
use ip-access-list in NO-ICMP Then trying to ping this host from its adopting controller this is what I see as deny - the I means inbound direction
AP#service pktcap on
deny filter not mint
Capturing up to 50 packets. Use Ctrl-C to abort.
1 9:24:54.304425
I "
NO-ICMP:ip"/0 ICMP: 192.168.7.205 > 88.88.88.88 echo request, id 26268, seq 1, length 108, DF, DSCP 0
2 9:24:55.305571
I "
NO-ICMP:ip"/0 ICMP: 192.168.7.205 > 88.88.88.88 echo request, id 26268, seq 2, length 108, DF, DSCP 0
3 9:24:56.305600
I "
NO-ICMP:ip"/0 ICMP: 192.168.7.205 > 88.88.88.88 echo request, id 26268, seq 3, length 108, DF, DSCP 0
4 9:24:57.305576
I "
NO-ICMP:ip"/0 ICMP: 192.168.7.205 > 88.88.88.88 echo request, id 26268, seq 4, length 108, DF, DSCP 0
5 9:24:58.305581
I "
NO-ICMP:ip"/0 ICMP: 192.168.7.205 > 88.88.88.88 echo request, id 26268, seq 5, length 108, DF, DSCP 0However, FROM the AP you are able to ping controller as this is outbound request
AP#ping 192.168.7.205
PING 192.168.7.205 (192.168.7.205) 100(128) bytes of data.
108 bytes from 192.168.7.205: icmp_seq=1 ttl=63 time=0.596 ms
108 bytes from 192.168.7.205: icmp_seq=2 ttl=63 time=0.496 ms
I am not sure about the system architecture but I consider interface "
bridge" as a bus between GEs, VLANs and RADIOs. However, you request was not to respond to DHCP discoveries incoming from wired side - this is done by dropping traffic with source port
UDP 68
Does it make sense?
Regards,
Ondrej