<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best practice for controlling inter-VLAN access in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323682#M597930</link>
    <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1911802"&gt;@Josh Mil&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you’re implementing intervlan access control on a L3 switch, the most efective and manageable option is to use routed ACLs 'RACL'&amp;nbsp;applied to SVIs. These operate at L3 and allow you to define which subnets (i.e., VLAN interfaces) can communicate with each other.&lt;/P&gt;
&lt;P&gt;Vlan ACLs, VACL, are generally not suitable for this scenario since they apply filtering inside a VLAN and are not meant for controlling trafic routed between VLANs...&lt;/P&gt;
&lt;P&gt;Now, regarding the placement of ACL_ whether on the source or the destination SVI_ the performance difference is negligible because both directions are evaluated in hardware. Instead, the decision should be made based on operational clarity. If your team think of VLANs like secured rooms with a guard at the door, inbound ACLs on destination SVIs make sense. If you prefer to stop traffic right when it leaves its source, inbound ACLs on source SVIs would be the choice.&lt;/P&gt;
&lt;P&gt;The important thing is to be consistent in how you implement them, so the rule placement is predictable and more intuitive.&lt;/P&gt;
&lt;P&gt;Finaly, there isn’t a built-in command to simply &lt;EM&gt;deny VLAN 40 to VLAN 10&lt;/EM&gt;&amp;nbsp;without referencing IP address. Once routing is enabled, the switch makes all forwarding decisions based on L3 networks, not vlan id. The "clean way" to implement your requirements is to create acl that reference the VLANs’ subnet addresses, and then apply those ACLs inbound on the appropriate SVIs. This achieves the same result, and since ACL lookup are done in hardware, there is no performance penalty !&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 24 Aug 2025 07:23:31 GMT</pubDate>
    <dc:creator>M02@rt37</dc:creator>
    <dc:date>2025-08-24T07:23:31Z</dc:date>
    <item>
      <title>Best practice for controlling inter-VLAN access</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323677#M597928</link>
      <description>&lt;P&gt;Hi, can I get some help with implementing inter-VLAN access control?&lt;/P&gt;&lt;P&gt;Scenario: A layer 3 switch is handling multiple VLANs, such as Staff, IT, Guest, IoT, and CCTV. I need to define access rules to control which VLAN can access which VLAN. For example, IT can access all VLANs, Corporate can access IoT and CCTV, Guest cannot access any other VLAN.&lt;/P&gt;&lt;P&gt;I have the following options:&lt;BR /&gt;(1) ACLs on source SVIs&lt;BR /&gt;(2) ACLs on destination SVIs&lt;BR /&gt;(3) VACLs on source VLANs&lt;BR /&gt;(4) VACLs on destination VLANs&lt;/P&gt;&lt;P&gt;My questions:&lt;/P&gt;&lt;P&gt;[1] Everyone says, ACLs should be applied as close to the traffic source as possible. That means option 1 and 3 are preferred? But what if I define ACLs on the destination? Does it really have noticeable impact on performance? Nevertheless, it feels more natural and intuitive to hire a security guard at the visitee's door to check visitors, and not at the visitors' homes. When a new VLAN is added to the network, if no denial rules are defined (or not correctly defined), at least it won't accidentally grant the new VLAN access to the existing VLANs, which feels safer.&lt;/P&gt;&lt;P&gt;[2] ACL vs VACL, which is more suitable in this scenario?&lt;/P&gt;&lt;P&gt;[3] Is it possible to define a rule that controls access between whole VLANs? For example:&lt;/P&gt;&lt;PRE&gt;! enable routing from vlan 20 to vlan 30, regardless of layer 3 address, protocol, port number&lt;BR /&gt;permit vlan 20 vlan 30&lt;BR /&gt;! disable routing from vlan 40 to vlan 10&lt;BR /&gt;deny vlan 40 vlan 10&lt;/PRE&gt;&lt;P&gt;So far, all the ACLs for controlling inter-VLAN access that I've seen are based on IP addresses. Even &lt;EM&gt;0.0.0.0&lt;/EM&gt; or &lt;EM&gt;any&lt;/EM&gt; are still IP addresses. I assume the switch still needs to do computing like XOR operations to determine whether a given address matches the criteria. If there is a simple 'toggle' enabling or disabling routing between two given VLANs, that would be more efficient.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 07:01:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323677#M597928</guid>
      <dc:creator>Josh Mil</dc:creator>
      <dc:date>2025-08-24T07:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for controlling inter-VLAN access</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323680#M597929</link>
      <description>&lt;P&gt;Inter VLAN traffic filter need ACL not VACL' VACL us mainly for intra VLAN not inter VLAN&lt;/P&gt;
&lt;P&gt;Best config is use ACL in source (under vlan source)&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 07:17:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323680#M597929</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-08-24T07:17:16Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for controlling inter-VLAN access</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323682#M597930</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1911802"&gt;@Josh Mil&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you’re implementing intervlan access control on a L3 switch, the most efective and manageable option is to use routed ACLs 'RACL'&amp;nbsp;applied to SVIs. These operate at L3 and allow you to define which subnets (i.e., VLAN interfaces) can communicate with each other.&lt;/P&gt;
&lt;P&gt;Vlan ACLs, VACL, are generally not suitable for this scenario since they apply filtering inside a VLAN and are not meant for controlling trafic routed between VLANs...&lt;/P&gt;
&lt;P&gt;Now, regarding the placement of ACL_ whether on the source or the destination SVI_ the performance difference is negligible because both directions are evaluated in hardware. Instead, the decision should be made based on operational clarity. If your team think of VLANs like secured rooms with a guard at the door, inbound ACLs on destination SVIs make sense. If you prefer to stop traffic right when it leaves its source, inbound ACLs on source SVIs would be the choice.&lt;/P&gt;
&lt;P&gt;The important thing is to be consistent in how you implement them, so the rule placement is predictable and more intuitive.&lt;/P&gt;
&lt;P&gt;Finaly, there isn’t a built-in command to simply &lt;EM&gt;deny VLAN 40 to VLAN 10&lt;/EM&gt;&amp;nbsp;without referencing IP address. Once routing is enabled, the switch makes all forwarding decisions based on L3 networks, not vlan id. The "clean way" to implement your requirements is to create acl that reference the VLANs’ subnet addresses, and then apply those ACLs inbound on the appropriate SVIs. This achieves the same result, and since ACL lookup are done in hardware, there is no performance penalty !&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 07:23:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323682#M597930</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2025-08-24T07:23:31Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for controlling inter-VLAN access</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323684#M597931</link>
      <description>&lt;P&gt;Thank you so much for your reply in detail. Now I have no more concern on using IP address for defining access rules.&lt;/P&gt;&lt;P&gt;With regard to choosing between ACL and VACL, if I define the rule by specifying a source IP range from VLAN 10 and a destination IP range from VLAN 20, it seems to do the job as well. I don't even need to create SVIs before creating the access rules. In the future, should any changes are made to the SVI, I won't need to re-assign the ACL. So, what are the drawbacks of using VACLs for controlling inter-VLAN access?&lt;/P&gt;&lt;P&gt;Since the mainstream designs apply ACLs on the source side, there must be some strong reasons. If I decide to assign ACLs on the destination SVIs, what possible downsides shall I be aware of?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 07:52:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323684#M597931</guid>
      <dc:creator>Josh Mil</dc:creator>
      <dc:date>2025-08-24T07:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for controlling inter-VLAN access</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323685#M597932</link>
      <description>&lt;P&gt;Thank you. Can I further ask the reasons? What issues can it cause if I use VACL for filtering inter VLAN traffic? And are there any scenarios where ACL on destination side is preferred?&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 07:56:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323685#M597932</guid>
      <dc:creator>Josh Mil</dc:creator>
      <dc:date>2025-08-24T07:56:11Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for controlling inter-VLAN access</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323690#M597933</link>
      <description>&lt;P&gt;VACL use for intra and inter VLAN' wrong config can lead to loss connection between client to client in same subnet or client to GW' I prefer use ACL which is use only for inter VLAN.&lt;/P&gt;
&lt;P&gt;Apply ACL in destiantion not recommend'&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Image this guest vlan abd corporate vlan try to access server in server vlan'&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You have DDoS attack from guest vlan&lt;/P&gt;
&lt;P&gt;The traffic will pass until SVI of server VLAN and then drop' this effect whole server vlan&lt;/P&gt;
&lt;P&gt;Where if I apply it at guest vlan then traffic will drop in guest vlan (near source) and other traffic not effect.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 08:18:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323690#M597933</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-08-24T08:18:52Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for controlling inter-VLAN access</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323695#M597934</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1911802"&gt;@Josh Mil&lt;/a&gt;&amp;nbsp;what is the scale of your scenario? Managing ACLs/VACLS locally on switches is cumbersome and doesn't scale well. TrustSec is more scalable as policies are managed centrally via ISE, tags (SGTs) are assigned to the authenticated devices and policies based on SGT rather than IP to restrict the traffic (inter and intra-VLAN). These SGTs can be used throughout the network on switches, routers, firewalls and proxies - so you can get end-to-end policy enforcement.&lt;/P&gt;
&lt;P&gt;The downside is the additional cost of ISE and implementation.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 08:24:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323695#M597934</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-08-24T08:24:19Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for controlling inter-VLAN access</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323716#M597935</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1911802"&gt;@Josh Mil&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;VACL&amp;nbsp;can technicaly block intervlan trafic, but they apply to all traffic within a VLAN (including intra-vlan), are less flexible, less intuitive to read anlso, and not universally supported.&lt;/P&gt;
&lt;P&gt;RACLs on SVIs are clearer I think, safer, and purpose-built for inter-VLAN access control !&lt;/P&gt;
&lt;P&gt;ACL on the source SVI are the mainstream choice because they contain mistakes, prevent new VLANs from accidentally accessing everything, and reduce wasted traffic.&lt;/P&gt;
&lt;P&gt;Apply an ACLs on the destination SVI also works, but carries a higher risk of exposing a VLAN if an ACL is missed...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 09:10:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323716#M597935</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2025-08-24T09:10:14Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for controlling inter-VLAN access</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323728#M597936</link>
      <description>&lt;P&gt;Thank you. In the DDos example, I assume the rate limiting set on the incoming port of the guest vlan should be much lower than the switching capacity of the server vlan, so the incoming port will get blocked before the server vlan is saturated. Not sure whether this is right?&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 10:22:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323728#M597936</guid>
      <dc:creator>Josh Mil</dc:creator>
      <dc:date>2025-08-24T10:22:33Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for controlling inter-VLAN access</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323729#M597937</link>
      <description>&lt;P&gt;It's a small network, but I'd like to learn more in general.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 10:24:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323729#M597937</guid>
      <dc:creator>Josh Mil</dc:creator>
      <dc:date>2025-08-24T10:24:48Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for controlling inter-VLAN access</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323732#M597938</link>
      <description>&lt;P&gt;Rate limit meaning CoPP?&lt;/P&gt;
&lt;P&gt;The target of DDoS is server not vlan IP&lt;/P&gt;
&lt;P&gt;So it better isolate guest from server and corporate vlan.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 10:33:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323732#M597938</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-08-24T10:33:33Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for controlling inter-VLAN access</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323745#M597939</link>
      <description>&lt;P&gt;Thank you. I still don't quite understand the point that applying ACL on the source SVI prevents new Vlans from accidentally accessing everything.&lt;/P&gt;&lt;P&gt;If we define access rules on each destination SVI, a new VLAN should be denied access to other VLANs due to the "deny any any" at the bottom of each existing ACL. In other words, a new VLAN has access to nothing by default, until we explicitly create permit entries on the destination Vlans.&lt;/P&gt;&lt;P&gt;In contrast, if we take the approach of defining access rules on the source side, that means there is no default protection on the destination side. When we create a new VLAN but forget to restrict its access to existing VLANs, the new VLAN will gain access to all the existing VLANs by default.&lt;/P&gt;&lt;P&gt;Certainly, if we create a new VLAN but forget to create an ACL to protect itself, then it's exposed to the existing VLANs, but I think the consequence of exposing a new VLAN (probably not put in use yet) should be less severe than exposing existing VLANs (already have servers or restricted resources in them).&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 11:18:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323745#M597939</guid>
      <dc:creator>Josh Mil</dc:creator>
      <dc:date>2025-08-24T11:18:20Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for controlling inter-VLAN access</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323746#M597940</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Certainly, if we create a new VLAN but forget to create an ACL to protect itself, then it's exposed to the existing VLANs, but I think the consequence of exposing a new VLAN (probably not put in use yet) should be less severe than exposing existing VLANs (already have servers or restricted resources in them). &amp;lt;&amp;lt;- if by mistake and add vlan without config ACL under it, then sure ACL in destination is solution, but each solution have pros&amp;amp;cons the cons of add ACL in destination is more than it pros&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 11:25:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5323746#M597940</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-08-24T11:25:52Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for controlling inter-VLAN access</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5326206#M598012</link>
      <description>&lt;P&gt;More nice and accurate answer of using source ACL&amp;nbsp;&lt;/P&gt;
&lt;P&gt;""Stops traffic closer to the source, reducing bandwidth waste""&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 01 Sep 2025 15:00:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practice-for-controlling-inter-vlan-access/m-p/5326206#M598012</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-09-01T15:00:36Z</dc:date>
    </item>
  </channel>
</rss>

