<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access list for interVLAN in Routing and SD-WAN</title>
    <link>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090623#M334732</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you want to Vlan 1 and Vlan 2 to be able to access each other, you need to add the lines marked in bold. I don't think you can achieve what you want with just one ACL (at least I could not).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip dhcp excluded-address 192.168.1.1&lt;BR /&gt;ip dhcp excluded-address 192.168.2.1&lt;BR /&gt;ip dhcp excluded-address 192.168.3.1&lt;BR /&gt;ip dhcp excluded-address 192.168.4.1&lt;BR /&gt;ip dhcp excluded-address 192.168.5.1&lt;BR /&gt;ip dhcp excluded-address 192.168.6.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN1&lt;BR /&gt;network 192.168.1.0 255.255.255.0&lt;BR /&gt;default-router 192.168.1.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN2&lt;BR /&gt;network 192.168.2.0 255.255.255.0&lt;BR /&gt;default-router 192.168.2.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN3&lt;BR /&gt;network 192.168.3.0 255.255.255.0&lt;BR /&gt;default-router 192.168.3.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN4&lt;BR /&gt;network 192.168.4.0 255.255.255.0&lt;BR /&gt;default-router 192.168.4.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN5&lt;BR /&gt;network 192.168.5.0 255.255.255.0&lt;BR /&gt;default-router 192.168.5.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN6&lt;BR /&gt;network 192.168.6.0 255.255.255.0&lt;BR /&gt;default-router 192.168.6.1&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;ip access-group 101 in&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;ip access-group 102 in&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt;ip address 192.168.3.1 255.255.255.0&lt;BR /&gt;ip access-group 103 in&lt;BR /&gt;!&lt;BR /&gt;interface Vlan4&lt;BR /&gt;ip address 192.168.4.1 255.255.255.0&lt;BR /&gt;ip access-group 104 in&lt;BR /&gt;!&lt;BR /&gt;interface Vlan5&lt;BR /&gt;ip address 192.168.5.1 255.255.255.0&lt;BR /&gt;ip access-group 105 in&lt;BR /&gt;!&lt;BR /&gt;interface Vlan6&lt;BR /&gt;ip address 192.168.6.1 255.255.255.0&lt;BR /&gt;ip access-group 106 in&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255&lt;/STRONG&gt;&lt;BR /&gt;access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255&lt;BR /&gt;access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.4.0 0.0.0.255&lt;BR /&gt;access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.5.0 0.0.0.255&lt;BR /&gt;access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.6.0 0.0.0.255&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;access-list 102 permit ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;/STRONG&gt;&lt;BR /&gt;access-list 102 permit ip 192.168.2.0 0.0.0.255 192.168.3.0 0.0.0.255&lt;BR /&gt;access-list 102 permit ip 192.168.2.0 0.0.0.255 192.168.4.0 0.0.0.255&lt;BR /&gt;access-list 102 permit ip 192.168.2.0 0.0.0.255 192.168.5.0 0.0.0.255&lt;BR /&gt;access-list 102 permit ip 192.168.2.0 0.0.0.255 192.168.6.0 0.0.0.255&lt;BR /&gt;!&lt;BR /&gt;access-list 103 permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;access-list 103 permit tcp 192.168.3.0 0.0.0.255 192.168.2.0 0.0.0.255 established&lt;BR /&gt;!&lt;BR /&gt;access-list 104 permit ip 192.168.4.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;access-list 104 permit tcp 192.168.4.0 0.0.0.255 192.168.2.0 0.0.0.255 established&lt;BR /&gt;!&lt;BR /&gt;access-list 105 permit ip 192.168.5.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;access-list 105 permit tcp 192.168.5.0 0.0.0.255 192.168.2.0 0.0.0.255 established&lt;BR /&gt;!&lt;BR /&gt;access-list 106 permit ip 192.168.6.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;access-list 106 permit tcp 192.168.6.0 0.0.0.255 192.168.2.0 0.0.0.255 established&lt;/P&gt;</description>
    <pubDate>Fri, 22 May 2020 10:44:58 GMT</pubDate>
    <dc:creator>Georg Pauwen</dc:creator>
    <dc:date>2020-05-22T10:44:58Z</dc:date>
    <item>
      <title>Access list for interVLAN</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090460#M334692</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I have a Cisco WS-C3560X-24 with 6 VLANs:&lt;/P&gt;&lt;P&gt;VLAN 1: 192.168.1.0/24&lt;/P&gt;&lt;P&gt;VLAN 2: 192.168.2.0/24&lt;/P&gt;&lt;P&gt;VLAN 3: 192.168.3.0/24&lt;/P&gt;&lt;P&gt;VLAN 4: 192.168.4.0/24&lt;/P&gt;&lt;P&gt;VLAN 5: 192.168.5.0/24&lt;/P&gt;&lt;P&gt;VLAN 6: 192.168.6.0/24&lt;/P&gt;&lt;P&gt;I want to configure ACL so that: All VLANs can access VLAN 1, only VLAN 1 and VLAN 2 can access other VLANs&lt;/P&gt;&lt;P&gt;My expected output is:&lt;/P&gt;&lt;P&gt;vlan 1,2 can each other and access 3,4,5,6&lt;BR /&gt;vlan 3 can access vlan 1, cannot access vlan 2,4,5,6&lt;BR /&gt;vlan 4 can access vlan 1, cannot access vlan 2,3,5,6&lt;BR /&gt;vlan 5 can access vlan 1, cannot access vlan 2,3,4,6&lt;BR /&gt;vlan 6 can access vlan 1, cannot access vlan 2,3,4,5&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Can you please help me with the Cisco command ?&lt;/P&gt;&lt;P&gt;Thank for your help !&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 09:01:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090460#M334692</guid>
      <dc:creator>JasonOwen</dc:creator>
      <dc:date>2020-05-22T09:01:35Z</dc:date>
    </item>
    <item>
      <title>Re: Access list for interVLAN</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090480#M334693</link>
      <description>&lt;P&gt;Can anyone help me, please?&lt;/P&gt;&lt;P&gt;Thank you very much &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 04:02:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090480#M334693</guid>
      <dc:creator>JasonOwen</dc:creator>
      <dc:date>2020-05-22T04:02:40Z</dc:date>
    </item>
    <item>
      <title>Re: Access list for interVLAN</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090490#M334697</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN class=""&gt;&lt;A id="link_13" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1053156" target="_self"&gt;JasonOwen&lt;/A&gt;,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;Please see the below ACL as per your request.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;The first 8 commands allows vlan 1 and 2 to communicate only to 3,4,5,6&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;The next 4 commands allows vlan 3,4,5,6 to communicate only to vlan 1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;ip access-list extended test &lt;BR /&gt;permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255&lt;BR /&gt;permit ip 192.168.1.0 0.0.0.255 192.168.4.0 0.0.0.255&lt;BR /&gt;permit ip 192.168.1.0 0.0.0.255 192.168.5.0 0.0.0.255&lt;BR /&gt;permit ip 192.168.1.0 0.0.0.255 192.168.6.0 0.0.0.255&lt;BR /&gt;permit ip 192.168.2.0 0.0.0.255 192.168.3.0 0.0.0.255&lt;BR /&gt;permit ip 192.168.2.0 0.0.0.255 192.168.4.0 0.0.0.255&lt;BR /&gt;permit ip 192.168.2.0 0.0.0.255 192.168.5.0 0.0.0.255&lt;BR /&gt;permit ip 192.168.2.0 0.0.0.255 192.168.6.0 0.0.0.255&lt;BR /&gt;permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;permit ip 192.168.4.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;permit ip 192.168.5.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;permit ip 192.168.6.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;/P&gt;
&lt;P&gt;Hope this helps. Additionally if you had a proper range we can still restrict the ACL commands. Currently the range will not work as it will allow the other networks as well.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Naresh M&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 05:42:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090490#M334697</guid>
      <dc:creator>Naresh Murali</dc:creator>
      <dc:date>2020-05-22T05:42:19Z</dc:date>
    </item>
    <item>
      <title>Re: Access list for interVLAN</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090508#M334701</link>
      <description>&lt;P&gt;Thank&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/91169"&gt;@Naresh Murali&lt;/a&gt;&amp;nbsp;so much for your advice!&lt;/P&gt;&lt;P&gt;Sorry for my missing expectation:&lt;/P&gt;&lt;P&gt;regarding vlan 1,2: they can access each other and access all the rest vlans.&lt;/P&gt;&lt;P&gt;So i have to add 1 more line as below, right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then the commands should be:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ip access-list extended test&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;permit ip 192.168.1.0 0.0.0.255 192.168.4.0 0.0.0.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;permit ip 192.168.1.0 0.0.0.255 192.168.5.0 0.0.0.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;permit ip 192.168.1.0 0.0.0.255 192.168.6.0 0.0.0.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;permit ip 192.168.2.0 0.0.0.255 192.168.3.0 0.0.0.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;permit ip 192.168.2.0 0.0.0.255 192.168.4.0 0.0.0.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;permit ip 192.168.2.0 0.0.0.255 192.168.5.0 0.0.0.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;permit ip 192.168.2.0 0.0.0.255 192.168.6.0 0.0.0.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;permit ip 192.168.4.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;permit ip 192.168.5.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;permit ip 192.168.6.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;then configure all vlans access this ACL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;int range vlan 1-6&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ip access-group test in&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Otherwise, please advise.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 06:31:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090508#M334701</guid>
      <dc:creator>JasonOwen</dc:creator>
      <dc:date>2020-05-22T06:31:27Z</dc:date>
    </item>
    <item>
      <title>Re: Access list for interVLAN</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090515#M334703</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;just for clarifification:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;vlan 1,2 can access 3,4,5,6&lt;BR /&gt;vlan 3 can access vlan 1, cannot access vlan 2,4,5,6&lt;BR /&gt;vlan 4 can access vlan 1, cannot access vlan 2,3,5,6&lt;BR /&gt;vlan 5 can access vlan 1, cannot access vlan 2,3,4,6&lt;BR /&gt;vlan 6 can access vlan 1, cannot access vlan 2,3,4,5&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You want Vlan 2 to access Vlan 3,4,5,6, but not vice versa, that is, you don't want Vlan 3,4,5,6 to access Vlan 2 ? If that is the case (one way traffic only), you need something like a reflexive access list...&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 06:46:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090515#M334703</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2020-05-22T06:46:26Z</dc:date>
    </item>
    <item>
      <title>Re: Access list for interVLAN</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090534#M334713</link>
      <description>&lt;P&gt;Exactly&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/162085"&gt;@Georg Pauwen&lt;/a&gt;&amp;nbsp;That's is my expectation, Just one way ! Can you help me?&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 07:25:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090534#M334713</guid>
      <dc:creator>JasonOwen</dc:creator>
      <dc:date>2020-05-22T07:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: Access list for interVLAN</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090551#M334720</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for the clarification. I'll work something out and get back with you...&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 08:04:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090551#M334720</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2020-05-22T08:04:38Z</dc:date>
    </item>
    <item>
      <title>Re: Access list for interVLAN</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090564#M334722</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1053156"&gt;@JasonOwen&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;I am afraid that reflexive ACLs may be not supported on a multilayer switch like yours.&lt;/P&gt;
&lt;P&gt;However you can achieve an approximate solution using extended IP ACLs if all you need is that TCP connections can be started from hosts in Vlan 1,2 to vlans 3,4,5,6 and not viceversa.&lt;/P&gt;
&lt;P&gt;The key command is to permit tcp between for example Vlan3 Ip subnet and Vlan1 subnet adding the keyword established at the end.&lt;/P&gt;
&lt;P&gt;In this way all TCP sessions starting from Vlan3 to Vlan1 would be denied as the initial packet has the TCP flag SYN set and established keyword check for this to be not set.&lt;/P&gt;
&lt;P&gt;A similar reasoning could be done for ICMP allowing ICMP echo-reply but not ICMP echo-.request.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A true one way connectivity is useless what we would like to achieve is usually what side can initiate a TCP session.&lt;/P&gt;
&lt;P&gt;UDP misses the concept of session.&lt;/P&gt;
&lt;P&gt;With the proposed ACLs the return packets of traffic initiated from Vlan 1 or 2 to Vlan 3-6 could be blocked breaking the connectivity.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope to help&lt;/P&gt;
&lt;P&gt;Giuseppe&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 08:23:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090564#M334722</guid>
      <dc:creator>Giuseppe Larosa</dc:creator>
      <dc:date>2020-05-22T08:23:49Z</dc:date>
    </item>
    <item>
      <title>Re: Access list for interVLAN</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090589#M334725</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN class=""&gt;&lt;A id="link_13" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1053156" target="_self"&gt;JasonOwen&lt;/A&gt;,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;It will be two more line then.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;&lt;STRONG&gt;permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;&lt;STRONG&gt;permit ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;Naresh M&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 09:29:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090589#M334725</guid>
      <dc:creator>Naresh Murali</dc:creator>
      <dc:date>2020-05-22T09:29:53Z</dc:date>
    </item>
    <item>
      <title>Re: Access list for interVLAN</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090591#M334726</link>
      <description>&lt;P&gt;Thank&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325924"&gt;@Giuseppe Larosa&lt;/a&gt;&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; That's a nice explanation. But i confused something, can you help to explain more?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You said: "I am afraid that reflexive ACLs may be not supported on a multilayer switch like yours." -&amp;gt; That means my switch don't support running reflexive ACL?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 09:31:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090591#M334726</guid>
      <dc:creator>JasonOwen</dc:creator>
      <dc:date>2020-05-22T09:31:55Z</dc:date>
    </item>
    <item>
      <title>Re: Access list for interVLAN</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090596#M334728</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1053156"&gt;@JasonOwen&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;I'm not sure that reflexive ACLs are not supported on C3560 but it is likely as it is a security feature that is typically configured on routers.&lt;/P&gt;
&lt;P&gt;IF they create dynamic entries for return traffic this is likely not supported on the TCAM in switch hardware.&lt;/P&gt;
&lt;P&gt;For this reason I have written my post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Edit:&lt;/P&gt;
&lt;P&gt;see&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_58_se/configuration/guide/3560scg/swacl.html?dtid=osscdc000283" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_58_se/configuration/guide/3560scg/swacl.html?dtid=osscdc000283&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;only standard and extended ACLs can be applied to an SVI on a C3560.&lt;/P&gt;
&lt;P&gt;Even if the link is about an old release I think this limitation is caused by HW limitation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope to help&lt;/P&gt;
&lt;P&gt;Giuseppe&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 09:53:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090596#M334728</guid>
      <dc:creator>Giuseppe Larosa</dc:creator>
      <dc:date>2020-05-22T09:53:25Z</dc:date>
    </item>
    <item>
      <title>Re: Access list for interVLAN</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090598#M334729</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sorry, it took a while, I had to test this first. Below is the config I have come up with. For the sake of simplicity, I have added a DHCP pool for each Vlan, you might or might not need this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip dhcp excluded-address 192.168.1.1&lt;BR /&gt;ip dhcp excluded-address 192.168.2.1&lt;BR /&gt;ip dhcp excluded-address 192.168.3.1&lt;BR /&gt;ip dhcp excluded-address 192.168.4.1&lt;BR /&gt;ip dhcp excluded-address 192.168.5.1&lt;BR /&gt;ip dhcp excluded-address 192.168.6.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN1&lt;BR /&gt;network 192.168.1.0 255.255.255.0&lt;BR /&gt;default-router 192.168.1.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN2&lt;BR /&gt;network 192.168.2.0 255.255.255.0&lt;BR /&gt;default-router 192.168.2.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN3&lt;BR /&gt;network 192.168.3.0 255.255.255.0&lt;BR /&gt;default-router 192.168.3.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN4&lt;BR /&gt;network 192.168.4.0 255.255.255.0&lt;BR /&gt;default-router 192.168.4.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN5&lt;BR /&gt;network 192.168.5.0 255.255.255.0&lt;BR /&gt;default-router 192.168.5.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN6&lt;BR /&gt;network 192.168.6.0 255.255.255.0&lt;BR /&gt;default-router 192.168.6.1&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;ip access-group 101 in&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;ip access-group 102 in&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt;ip address 192.168.3.1 255.255.255.0&lt;BR /&gt;ip access-group 103 in&lt;BR /&gt;!&lt;BR /&gt;interface Vlan4&lt;BR /&gt;ip address 192.168.4.1 255.255.255.0&lt;BR /&gt;ip access-group 104 in&lt;BR /&gt;!&lt;BR /&gt;interface Vlan5&lt;BR /&gt;ip address 192.168.5.1 255.255.255.0&lt;BR /&gt;ip access-group 105 in&lt;BR /&gt;!&lt;BR /&gt;interface Vlan6&lt;BR /&gt;ip address 192.168.6.1 255.255.255.0&lt;BR /&gt;ip access-group 106 in&lt;BR /&gt;!&lt;BR /&gt;access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255&lt;BR /&gt;access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.4.0 0.0.0.255&lt;BR /&gt;access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.5.0 0.0.0.255&lt;BR /&gt;access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.6.0 0.0.0.255&lt;BR /&gt;!&lt;BR /&gt;access-list 102 permit ip 192.168.2.0 0.0.0.255 192.168.3.0 0.0.0.255&lt;BR /&gt;access-list 102 permit ip 192.168.2.0 0.0.0.255 192.168.4.0 0.0.0.255&lt;BR /&gt;access-list 102 permit ip 192.168.2.0 0.0.0.255 192.168.5.0 0.0.0.255&lt;BR /&gt;access-list 102 permit ip 192.168.2.0 0.0.0.255 192.168.6.0 0.0.0.255&lt;BR /&gt;!&lt;BR /&gt;access-list 103 permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;access-list 103 permit tcp 192.168.3.0 0.0.0.255 192.168.2.0 0.0.0.255 established&lt;BR /&gt;!&lt;BR /&gt;access-list 104 permit ip 192.168.4.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;access-list 104 permit tcp 192.168.4.0 0.0.0.255 192.168.2.0 0.0.0.255 established&lt;BR /&gt;!&lt;BR /&gt;access-list 105 permit ip 192.168.5.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;access-list 105 permit tcp 192.168.5.0 0.0.0.255 192.168.2.0 0.0.0.255 established&lt;BR /&gt;!&lt;BR /&gt;access-list 106 permit ip 192.168.6.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;access-list 106 permit tcp 192.168.6.0 0.0.0.255 192.168.2.0 0.0.0.255 established&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 09:55:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090598#M334729</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2020-05-22T09:55:04Z</dc:date>
    </item>
    <item>
      <title>Re: Access list for interVLAN</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090600#M334731</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325924"&gt;@Giuseppe Larosa&lt;/a&gt;&amp;nbsp;Ok, thank for your comment. What i need is only one way blocking .&amp;nbsp;&lt;/P&gt;&lt;P&gt;Vlan 1, 2 can access each other and all vlans&lt;/P&gt;&lt;P&gt;vlan 3,4,5,6 can access vlan 1 but cannot access each other&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you help me with simple extended ACL ?&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 10:05:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090600#M334731</guid>
      <dc:creator>JasonOwen</dc:creator>
      <dc:date>2020-05-22T10:05:11Z</dc:date>
    </item>
    <item>
      <title>Re: Access list for interVLAN</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090623#M334732</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you want to Vlan 1 and Vlan 2 to be able to access each other, you need to add the lines marked in bold. I don't think you can achieve what you want with just one ACL (at least I could not).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip dhcp excluded-address 192.168.1.1&lt;BR /&gt;ip dhcp excluded-address 192.168.2.1&lt;BR /&gt;ip dhcp excluded-address 192.168.3.1&lt;BR /&gt;ip dhcp excluded-address 192.168.4.1&lt;BR /&gt;ip dhcp excluded-address 192.168.5.1&lt;BR /&gt;ip dhcp excluded-address 192.168.6.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN1&lt;BR /&gt;network 192.168.1.0 255.255.255.0&lt;BR /&gt;default-router 192.168.1.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN2&lt;BR /&gt;network 192.168.2.0 255.255.255.0&lt;BR /&gt;default-router 192.168.2.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN3&lt;BR /&gt;network 192.168.3.0 255.255.255.0&lt;BR /&gt;default-router 192.168.3.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN4&lt;BR /&gt;network 192.168.4.0 255.255.255.0&lt;BR /&gt;default-router 192.168.4.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN5&lt;BR /&gt;network 192.168.5.0 255.255.255.0&lt;BR /&gt;default-router 192.168.5.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN6&lt;BR /&gt;network 192.168.6.0 255.255.255.0&lt;BR /&gt;default-router 192.168.6.1&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;ip access-group 101 in&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;ip access-group 102 in&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt;ip address 192.168.3.1 255.255.255.0&lt;BR /&gt;ip access-group 103 in&lt;BR /&gt;!&lt;BR /&gt;interface Vlan4&lt;BR /&gt;ip address 192.168.4.1 255.255.255.0&lt;BR /&gt;ip access-group 104 in&lt;BR /&gt;!&lt;BR /&gt;interface Vlan5&lt;BR /&gt;ip address 192.168.5.1 255.255.255.0&lt;BR /&gt;ip access-group 105 in&lt;BR /&gt;!&lt;BR /&gt;interface Vlan6&lt;BR /&gt;ip address 192.168.6.1 255.255.255.0&lt;BR /&gt;ip access-group 106 in&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255&lt;/STRONG&gt;&lt;BR /&gt;access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255&lt;BR /&gt;access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.4.0 0.0.0.255&lt;BR /&gt;access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.5.0 0.0.0.255&lt;BR /&gt;access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.6.0 0.0.0.255&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;access-list 102 permit ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;/STRONG&gt;&lt;BR /&gt;access-list 102 permit ip 192.168.2.0 0.0.0.255 192.168.3.0 0.0.0.255&lt;BR /&gt;access-list 102 permit ip 192.168.2.0 0.0.0.255 192.168.4.0 0.0.0.255&lt;BR /&gt;access-list 102 permit ip 192.168.2.0 0.0.0.255 192.168.5.0 0.0.0.255&lt;BR /&gt;access-list 102 permit ip 192.168.2.0 0.0.0.255 192.168.6.0 0.0.0.255&lt;BR /&gt;!&lt;BR /&gt;access-list 103 permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;access-list 103 permit tcp 192.168.3.0 0.0.0.255 192.168.2.0 0.0.0.255 established&lt;BR /&gt;!&lt;BR /&gt;access-list 104 permit ip 192.168.4.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;access-list 104 permit tcp 192.168.4.0 0.0.0.255 192.168.2.0 0.0.0.255 established&lt;BR /&gt;!&lt;BR /&gt;access-list 105 permit ip 192.168.5.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;access-list 105 permit tcp 192.168.5.0 0.0.0.255 192.168.2.0 0.0.0.255 established&lt;BR /&gt;!&lt;BR /&gt;access-list 106 permit ip 192.168.6.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;access-list 106 permit tcp 192.168.6.0 0.0.0.255 192.168.2.0 0.0.0.255 established&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 10:44:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090623#M334732</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2020-05-22T10:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: Access list for interVLAN</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090665#M334734</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1053156"&gt;@JasonOwen&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/162085"&gt;@Georg Pauwen&lt;/a&gt; has provided a good example of what you can configure.&lt;/P&gt;
&lt;P&gt;First of all, you will need multiple ACLs applied inbound to each SVI interface Vlan.&lt;/P&gt;
&lt;P&gt;Second factor to consider these IP ACLs even if extended are not stateful and you need to provide the return path.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So translating the one way connectivity to I would like TCP sessions started from hosts in Vlan 1,2 to hosts in vlans 3-6 to be able to be setup but not the opposite you can use something like&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface vlan 6&lt;/P&gt;
&lt;P&gt;ip access-group 106 in&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list 106 permit tcp 192.168.6.0 0.0.0.255 192.168.1.0 0.0.0.255 established&lt;/P&gt;
&lt;P&gt;access-list 106 permit tcp 192.168.6.0 0.0.0.255 192.168.2.0 0.0.0.255 established&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if no other networks should be accessed you can rely on the implicit deny any any at the end of the ACL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, if you need to allow internet access or access to other networks in general you would need to add&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list 106 deny ip 192.168.6.0 0.0.0.255 192.168.0.0 0.0.7.255&lt;/P&gt;
&lt;P&gt;access-list 106 permit ip 192.168.6.0 0.0.0.255 any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Actually you need to apply inbound ACLs only to the limited SVIs interface Vlan 3 to interface Vlan 6&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ACLs for SVI vlan 3 to vlan 5 would be similar to the one proposed here.&lt;/P&gt;
&lt;P&gt;If hosts in Vlans 3 to 6 can access vlan 1 the first line should be like proposed by Georg a permit ip.&lt;/P&gt;
&lt;P&gt;Here, I am proposing this alternate version to have only TCP sessions started from Vlan 1 to Vlans 3 to 6 to be able to be setup.&lt;/P&gt;
&lt;P&gt;Interface Vlan1 and interface Vlan2 could stay without any ACL applied unless your network is a closed connectivity one and there is no need for internet access and so on.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note:&lt;/P&gt;
&lt;P&gt;in case you need to provide internet access to users in Vlans 3 to 6 you may need to enable the traffic for DNS queries and DNS replies that use UDP port 53.&lt;/P&gt;
&lt;P&gt;It really depends where the DNS servers are located.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope to help&lt;/P&gt;
&lt;P&gt;Giuseppe&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 12:21:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090665#M334734</guid>
      <dc:creator>Giuseppe Larosa</dc:creator>
      <dc:date>2020-05-22T12:21:06Z</dc:date>
    </item>
    <item>
      <title>Re: Access list for interVLAN</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090791#M334757</link>
      <description>&lt;P&gt;There have been several posts in this discussion that mention reflexive access lists. And this relates to a fundamental problem with what you want to achieve. As an example you want a device in vlan 1 (perhaps it is 192.168.1.11) to communicate with a device in vlan 3 (perhaps it is 192.168.3.33). Assuming that you will use an access list inbound on interface vlan 3 to filter the traffic it will receive an IP packet whose source address is 192.168.3.33 and destination is 192.168.1.11 - should the access list permit or deny this packet? The answer is deny if the packet is from 192.168.3.33 initiating some to vlan 1. But the answer is permit if this is 192.168.3.33 responding to something initiated from vlan 1. How does the access list determine whether this is a response or not?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To really achieve your requirements requires doing stateful inspection in which we would know who initiated the traffic. I dont believe that your switch supports doing stateful inspection.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 15:10:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4090791#M334757</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2020-05-22T15:10:48Z</dc:date>
    </item>
    <item>
      <title>Re: Access list for interVLAN</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4091480#M334871</link>
      <description>&lt;P&gt;Thank&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/162085"&gt;@Georg Pauwen&lt;/a&gt;&amp;nbsp; and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325924"&gt;@Giuseppe Larosa&lt;/a&gt;&amp;nbsp;again for your helpful advice.&lt;/P&gt;&lt;P&gt;Please be noted that i just want to block interVLAN access.&lt;/P&gt;&lt;P&gt;I already had another policy to allow all vlans go to internet.&lt;/P&gt;&lt;P&gt;Let me try your advice and give feedback.&lt;/P&gt;&lt;P&gt;Thank all again.&lt;/P&gt;</description>
      <pubDate>Mon, 25 May 2020 02:15:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-list-for-intervlan/m-p/4091480#M334871</guid>
      <dc:creator>JasonOwen</dc:creator>
      <dc:date>2020-05-25T02:15:47Z</dc:date>
    </item>
  </channel>
</rss>

