<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need help with an ACL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/need-help-with-an-acl/m-p/3299884#M1007067</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You will need two access lists, one for each direction. The access-list applied in the "out" direction will contain the traffic that is going to your new vlan and the access-list applied in the "in"will contain traffic going to you servers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;</description>
    <pubDate>Thu, 21 Dec 2017 07:35:03 GMT</pubDate>
    <dc:creator>johnd2310</dc:creator>
    <dc:date>2017-12-21T07:35:03Z</dc:date>
    <item>
      <title>Need help with an ACL</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-an-acl/m-p/3299634#M1007064</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="usertext-body may-blank-within md-container "&gt;
&lt;DIV class="md"&gt;
&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;I am trying to make an ACL on my layer 3 switches (in HSRP) that would allow a new VLAN on my network to be accessible via RDP and ICMP from all other user VLAN's. Also, the server VLAN needs to do ICMP as well as TCP and UDP 445 to this new VLAN. And the new VLAN needs to access the following on the server VLAN:&lt;/P&gt;
&lt;P&gt;UDP Port 88 for Kerberos authentication UDP and TCP 135 for domain controllers-to-domain controller and client to domain controller operations. UDP 389 for LDAP to handle normal queries from client computers to the domain controllers. TCP and UDP Port 464 for Kerberos Password Change TCP Port 3268 and 3269 for Global Catalog from client to domain controller. TCP and UDP Port 53 for DNS from client to domain controller and domain controller to domain controller. TCP &amp;amp; UDP 49152-65535 the ephemeral ports are required ICMP (Echo)&lt;/P&gt;
&lt;P&gt;The following are the VLAN id's with the co-responding names:&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;vlan 20 - Servers - 10.10.20.0/22&lt;/LI&gt;
&lt;LI&gt;vlan 30 - User 1 - 10.10.30.0/24&lt;/LI&gt;
&lt;LI&gt;vlan 31 - User 2 - 10.10.31.0/24&lt;/LI&gt;
&lt;LI&gt;vlan 32 - User 3 - 10.10.32.0/24&lt;/LI&gt;
&lt;LI&gt;vlan 33 - User 4 - 10.10.33.0/24&lt;/LI&gt;
&lt;LI&gt;vlan 34 - User 5 - 10.10.34.0/24&lt;/LI&gt;
&lt;LI&gt;vlan 35 - User 6 - 10.10.35.0/24&lt;/LI&gt;
&lt;LI&gt;vlan 36 - User 7 - 10.10.36.0/24&lt;/LI&gt;
&lt;LI&gt;vlan 37 - User 8 - 10.10.30.0/24&lt;/LI&gt;
&lt;LI&gt;vlan 38 - User 9 - 10.10.30.0/24&lt;/LI&gt;
&lt;LI&gt;vlan 39 - User 10 - 10.10.30.0/24&lt;/LI&gt;
&lt;LI&gt;vlan 40 - User 11 - 10.10.40.0/24&lt;/LI&gt;
&lt;LI&gt;vlan 184 - Restricted user - 10.10.184.0/25&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The following is what I have currently in my ACL but its not working properly.&amp;nbsp;I am not able to RDP into my test system on the new vlan from anywhere.&amp;nbsp;I am also not able to authenticate with Active directory to log into windows with the domain account.&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;ip access-list extended RESTRICT-VLAN184-IN
remark Allow ICMP
permit icmp any any echo-reply
remark Allow RDP
permit tcp any any eq 3389
permit udp any any eq 3389
remark Allow VLAN20
permit tcp any 10.10.20.0 0.0.3.255 eq www
permit tcp any 10.10.20.0 0.0.3.255 eq domain
permit tcp any 10.10.20.0 0.0.3.255 eq 443
permit tcp any 10.10.20.0 0.0.3.255 eq 52230
permit tcp any 10.10.20.0 0.0.3.255 eq 135
permit tcp any 10.10.20.0 0.0.3.255 eq 464
permit tcp any 10.10.20.0 0.0.3.255 range 3268 3269
permit tcp any 10.10.20.0 0.0.3.255 range 49152 65535
permit udp any 10.10.20.0 0.0.3.255 eq domain
permit udp any 10.10.20.0 0.0.3.255 eq 88
permit udp any 10.10.20.0 0.0.3.255 eq 135
permit udp any 10.10.20.0 0.0.3.255 eq 389
permit udp any 10.10.20.0 0.0.3.255 eq 464
permit udp any 10.10.20.0 0.0.3.255 range 49152 65535
remark Deny all other VLANS
deny   ip any 10.10.0.0 0.0.255.255
remark Allow internet
permit ip any any
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;Applying the ACL inbound to the layer 3 vlan&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;interface vlan184
ip access-group RESTRICT-VLAN184-IN in
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;If anyone can help with this, it would be very much appreciated. Thanks in advance.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:59:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-an-acl/m-p/3299634#M1007064</guid>
      <dc:creator>thegreatone</dc:creator>
      <dc:date>2020-02-21T14:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with an ACL</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-an-acl/m-p/3299884#M1007067</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You will need two access lists, one for each direction. The access-list applied in the "out" direction will contain the traffic that is going to your new vlan and the access-list applied in the "in"will contain traffic going to you servers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2017 07:35:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-an-acl/m-p/3299884#M1007067</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2017-12-21T07:35:03Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with an ACL</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-an-acl/m-p/3300252#M1007070</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your reply. Do I apply both ACL's to the new VLAN? And also, do you think something is missing from my ACL or does something need to be added to make it work like I want it to?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2017 17:08:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-an-acl/m-p/3300252#M1007070</guid>
      <dc:creator>thegreatone</dc:creator>
      <dc:date>2017-12-21T17:08:24Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with an ACL</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-an-acl/m-p/3300322#M1007072</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/282553"&gt;@johnd2310&lt;/a&gt; wrote:&lt;BR /&gt;
&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You will need two access lists, one for each direction. The access-list applied in the "out" direction will contain the traffic that is going to your new vlan and the access-list applied in the "in"will contain traffic going to you servers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;I just tried applying another access-list in the out direction and now I am unable to get to anywhere from the restricted network to the other vlan's, even to stuff that I have applied to the "In" access-list&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2017 18:39:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-an-acl/m-p/3300322#M1007072</guid>
      <dc:creator>thegreatone</dc:creator>
      <dc:date>2017-12-21T18:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with an ACL</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-an-acl/m-p/3300782#M1007073</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;can you show ACL, that you applied for VLAN 20? You have to write in the ACL back rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Fri, 22 Dec 2017 12:59:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-an-acl/m-p/3300782#M1007073</guid>
      <dc:creator>Jewgeni Uschegow</dc:creator>
      <dc:date>2017-12-22T12:59:07Z</dc:date>
    </item>
  </channel>
</rss>

