04-12-2022 01:36 PM
yesterday
Hi Matt,
Absolutely, I can help clarify this. In your setup, since the VLANs’ default gateways are on the Extreme Switches, you can enforce most of your ACLs right there. You would create ACLs that allow only the specific traffic you want—like DNS (UDP 53) and DHCP (UDP 67/68)—from VLAN 510 to the server on VLAN 560, and then deny everything else between those VLANs. Applied inbound on the VLAN interfaces, this will prevent unwanted traffic before it even hits the router.
You generally don’t need to replicate these ACLs on the Cisco routers unless you want an extra layer of protection or are worried about inter-site routing. Blocking the whole 192.168.0.0/16 range wouldn’t work if you need selective access, because that would also block your allowed DNS/DHCP traffic. Instead, focus on explicitly permitting only the required services and then deny all other traffic, which keeps it simple and scalable as you expand to 48 VLANs.
The key is planning your ACLs carefully: start with the “allow” rules for necessary services, then a catch-all deny at the end. Testing each ACL in a lab or in one location first can save headaches later, especially with multiple sites and hundreds of routes involved.
05-12-2022 01:12 PM
Hi Matt,
To block inter-VLAN traffic, I would generally look to apply ACLs to the client VLANs on INGRESS at the default gateway for that VLAN (being EXOS in your case). This way you only have to worry about installing the ACL in one location instead of on a bunch of L2 switches. Adding another ACL to the Cisco router at that point would be a bit superfluous.
Keep in mind EXOS ACLs have an implied permit catch-all (versus Cisco's implied deny catch-all). Therefore, your ACL will probably have a few deny rules preventing traffic from reaching certain 'destination-address' ranges, and it may need a permit rule for your DNS server if that DNS server happens to be in one of the networks that you don't normally want the clients to reach.
ACLs are processed top-down and only follow the first rule they match. After all of your denies, the implied permit catch-all will allow for internet traffic.
Here is a helpful article about ACLs and ways they can be configured:
How To: How To: Create and Apply an ACL in EXOS | Extreme Portal (force.com)
Hope that helps!
04-29-2022 02:01 PM
04-29-2022 01:49 PM