04-12-2022 01:36 PM
05-12-2022 01:12 PM
Hi Matt,
To block inter-VLAN traffic, I would generally look to apply ACLs to the client VLANs on INGRESS at the default gateway for that VLAN (being EXOS in your case). This way you only have to worry about installing the ACL in one location instead of on a bunch of L2 switches. Adding another ACL to the Cisco router at that point would be a bit superfluous.
Keep in mind EXOS ACLs have an implied permit catch-all (versus Cisco's implied deny catch-all). Therefore, your ACL will probably have a few deny rules preventing traffic from reaching certain 'destination-address' ranges, and it may need a permit rule for your DNS server if that DNS server happens to be in one of the networks that you don't normally want the clients to reach.
ACLs are processed top-down and only follow the first rule they match. After all of your denies, the implied permit catch-all will allow for internet traffic.
Here is a helpful article about ACLs and ways they can be configured:
How To: How To: Create and Apply an ACL in EXOS | Extreme Portal (force.com)
Hope that helps!
04-29-2022 02:01 PM
04-29-2022 01:49 PM