<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VLAN mac address filtering in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vlan-mac-address-filtering/m-p/2892366#M155409</link>
    <description>&lt;P&gt;Good morning&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I am trying to figure out how to configure vlan ACL to filter mac addresses. And cannot make &lt;/SPAN&gt;&lt;SPAN&gt;it work!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The goal is to block all mac-addresses inside vlan except those are permitted.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I found a great&amp;nbsp;article which declares the same in the other&amp;nbsp;way: block certain macs and pass all the rest.&lt;A href="http://www.cisco.com/c/en/us/support/docs/switches/catalyst-3550-series-switches/64844-mac-acl-block-arp.html" target="_blank"&gt;http://www.cisco.com/c/en/us/support/docs/switches/catalyst-3550-series-switches/64844-mac-acl-block-arp.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So I made a similar confiuration for my requirements.&lt;/P&gt;
&lt;P&gt;But this setup ain't working as I want. What I see is that all traffic inside this vlan is blocked even those hosts which are permitted.&lt;/P&gt;
&lt;P&gt;Here's configuration:&lt;/P&gt;
&lt;P&gt;mac access-list extended secure&lt;BR /&gt;permit host 0800.27a5.05c5 any&lt;BR /&gt;permit any host 0800.27a5.05c5&lt;BR /&gt;permit host 3c97.0e26.f302 any&lt;BR /&gt;permit any host 3c97.0e26.f302&lt;BR /&gt;permit host b40c.258e.e401 any&lt;BR /&gt;permit any host b40c.258e.e401&lt;BR /&gt;permit host 001a.6d55.fc42 any&lt;BR /&gt;permit any host 001a.6d55.fc42&lt;BR /&gt;deny any any&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;vlan access-map block_hosts 10&lt;BR /&gt;action forward&lt;BR /&gt;match mac address secure&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;vlan filter block_hosts vlan-list 505&lt;/P&gt;
&lt;P&gt;Tried some other configurations with filters,&amp;nbsp;even adding ethertypes - no way, all traffic is blocked inside vlan.&lt;/P&gt;
&lt;P&gt;Also tried to add rhis in the end:&lt;/P&gt;
&lt;P&gt;vlan access-map block_hosts 20&lt;BR /&gt;action drop&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Removing&amp;nbsp;'access-list'а deny any any' -&amp;nbsp;also didn't help.&lt;/P&gt;
&lt;P&gt;If I following the doc and make some macs denied and the rest permitted — all works fine. But no for vice versa.&lt;/P&gt;
&lt;P&gt;I have also tried adding all mac addresses belonging to all catalyst interfaces, even to CPU, but no luck either.&lt;/P&gt;
&lt;P&gt;Could someone help?&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:31:59 GMT</pubDate>
    <dc:creator>Garage Irvine</dc:creator>
    <dc:date>2019-03-12T07:31:59Z</dc:date>
    <item>
      <title>VLAN mac address filtering</title>
      <link>https://community.cisco.com/t5/network-security/vlan-mac-address-filtering/m-p/2892366#M155409</link>
      <description>&lt;P&gt;Good morning&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I am trying to figure out how to configure vlan ACL to filter mac addresses. And cannot make &lt;/SPAN&gt;&lt;SPAN&gt;it work!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The goal is to block all mac-addresses inside vlan except those are permitted.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I found a great&amp;nbsp;article which declares the same in the other&amp;nbsp;way: block certain macs and pass all the rest.&lt;A href="http://www.cisco.com/c/en/us/support/docs/switches/catalyst-3550-series-switches/64844-mac-acl-block-arp.html" target="_blank"&gt;http://www.cisco.com/c/en/us/support/docs/switches/catalyst-3550-series-switches/64844-mac-acl-block-arp.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So I made a similar confiuration for my requirements.&lt;/P&gt;
&lt;P&gt;But this setup ain't working as I want. What I see is that all traffic inside this vlan is blocked even those hosts which are permitted.&lt;/P&gt;
&lt;P&gt;Here's configuration:&lt;/P&gt;
&lt;P&gt;mac access-list extended secure&lt;BR /&gt;permit host 0800.27a5.05c5 any&lt;BR /&gt;permit any host 0800.27a5.05c5&lt;BR /&gt;permit host 3c97.0e26.f302 any&lt;BR /&gt;permit any host 3c97.0e26.f302&lt;BR /&gt;permit host b40c.258e.e401 any&lt;BR /&gt;permit any host b40c.258e.e401&lt;BR /&gt;permit host 001a.6d55.fc42 any&lt;BR /&gt;permit any host 001a.6d55.fc42&lt;BR /&gt;deny any any&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;vlan access-map block_hosts 10&lt;BR /&gt;action forward&lt;BR /&gt;match mac address secure&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;vlan filter block_hosts vlan-list 505&lt;/P&gt;
&lt;P&gt;Tried some other configurations with filters,&amp;nbsp;even adding ethertypes - no way, all traffic is blocked inside vlan.&lt;/P&gt;
&lt;P&gt;Also tried to add rhis in the end:&lt;/P&gt;
&lt;P&gt;vlan access-map block_hosts 20&lt;BR /&gt;action drop&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Removing&amp;nbsp;'access-list'а deny any any' -&amp;nbsp;also didn't help.&lt;/P&gt;
&lt;P&gt;If I following the doc and make some macs denied and the rest permitted — all works fine. But no for vice versa.&lt;/P&gt;
&lt;P&gt;I have also tried adding all mac addresses belonging to all catalyst interfaces, even to CPU, but no luck either.&lt;/P&gt;
&lt;P&gt;Could someone help?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:31:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-mac-address-filtering/m-p/2892366#M155409</guid>
      <dc:creator>Garage Irvine</dc:creator>
      <dc:date>2019-03-12T07:31:59Z</dc:date>
    </item>
    <item>
      <title>Forgot to mention hardware:</title>
      <link>https://community.cisco.com/t5/network-security/vlan-mac-address-filtering/m-p/2892367#M155411</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Forgot to mention hardware:&lt;/P&gt;
&lt;P&gt;Cisco IOS Software, C3750 Software (C3750-IPSERVICESK9-M), Version 12.2(55)SE10, RELEASE SOFTWARE (fc2)&lt;BR /&gt;Technical Support:&amp;nbsp;&lt;A href="http://www.cisco.com/techsupport"&gt;http://www.cisco.com/techsupport&lt;/A&gt;&lt;BR /&gt;Copyright (c) 1986-2015 by Cisco Systems, Inc.&lt;BR /&gt;Compiled Wed 11-Feb-15 11:40 by prod_rel_team&lt;BR /&gt;Image text-base: 0x01000000, data-base: 0x02F00000&lt;/P&gt;
&lt;P&gt;ROM: Bootstrap program is C3750 boot loader&lt;BR /&gt;BOOTLDR: C3750 Boot Loader (C3750-HBOOT-M) Version 12.2(44)SE5, RELEASE SOFTWARE (fc1)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I tried to use&amp;nbsp;&lt;SPAN&gt;port-security&amp;nbsp;to filter all &amp;nbsp;mac-addresses except certain and it works fine, but it's not an option, since we have many catalyst and ports and it'l be a nightmare to maintain.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Mar 2016 14:04:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-mac-address-filtering/m-p/2892367#M155411</guid>
      <dc:creator>Garage Irvine</dc:creator>
      <dc:date>2016-03-22T14:04:45Z</dc:date>
    </item>
    <item>
      <title>This configuration blocks all</title>
      <link>https://community.cisco.com/t5/network-security/vlan-mac-address-filtering/m-p/2892368#M155412</link>
      <description>&lt;P&gt;This configuration blocks all traffic as well:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;mac access-list extended secure&lt;BR /&gt;permit host 0800.27a5.05c5 any&lt;BR /&gt;permit any host 0800.27a5.05c5&lt;BR /&gt;permit host 3c97.0e26.f302 any&lt;BR /&gt;permit any host 3c97.0e26.f302&lt;BR /&gt;permit host b40c.258e.e401 any&lt;BR /&gt;permit any host b40c.258e.e401&lt;BR /&gt;permit host 001a.6d55.fc42 any&lt;BR /&gt;permit any host 001a.6d55.fc42&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;mac access-list extended not-secure&lt;BR /&gt;permit any any&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;vlan access-map block_hosts 10&lt;BR /&gt;action forward&lt;BR /&gt;match mac address secure&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;vlan access-map block_hosts 20&lt;BR /&gt;action drop&lt;BR /&gt;match mac address not-secure&lt;BR /&gt;!&lt;BR /&gt;vlan filter block_hosts vlan-list 505&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This is also blocks all traffic:&lt;/P&gt;
&lt;P&gt;mac access-list extended not-secure&lt;BR /&gt;permit any any&lt;BR /&gt;mac access-list extended secure&lt;BR /&gt;permit host 0800.27a5.05c5 any&lt;BR /&gt;permit any host 0800.27a5.05c5&lt;BR /&gt;permit host 3c97.0e26.f302 any&lt;BR /&gt;permit any host 3c97.0e26.f302&lt;BR /&gt;permit host b40c.258e.e401 any&lt;BR /&gt;permit any host b40c.258e.e401&lt;BR /&gt;permit host 001a.6d55.fc42 any&lt;BR /&gt;permit any host 001a.6d55.fc42&lt;/P&gt;
&lt;P&gt;ip access-list extended allow&lt;BR /&gt;permit ip any any&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;vlan access-map block_hosts 10&lt;BR /&gt;action forward&lt;BR /&gt;match mac address secure&lt;BR /&gt;match ip address allow&lt;BR /&gt;vlan access-map block_hosts 20&lt;BR /&gt;action drop&lt;BR /&gt;match mac address not-secure&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;vlan filter block_hosts vlan-list 505&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;#show access-lists&lt;BR /&gt;Extended IP access list allow&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;10 permit ip any any (323 matches)&lt;BR /&gt;Extended MAC access list not-secure&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;permit any any&lt;BR /&gt;Extended MAC access list secure&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;permit host 0800.27a5.05c5 any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;permit any host 0800.27a5.05c5&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;permit host 3c97.0e26.f302 any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;permit any host 3c97.0e26.f302&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;permit host b40c.258e.e401 any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;permit any host b40c.258e.e401&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;permit host 001a.6d55.fc42 any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;permit any host 001a.6d55.fc42&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;#show arp&amp;nbsp;&amp;nbsp;| i 155&lt;BR /&gt;Internet&amp;nbsp;&amp;nbsp;192.168.155.34&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;0&amp;nbsp;&amp;nbsp; Incomplete&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;ARPA&lt;BR /&gt;Internet&amp;nbsp;&amp;nbsp;192.168.155.10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-&amp;nbsp;&amp;nbsp; 001a.6d55.fc42&amp;nbsp;&amp;nbsp;ARPA&amp;nbsp;&amp;nbsp; Vlan505&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;192.168.155.10 &amp;nbsp; -&amp;nbsp;local catalyst address&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;All is good when no vlan-list applied:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;#sh arp&lt;BR /&gt;Protocol&amp;nbsp;&amp;nbsp;Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Age (min)&amp;nbsp;&amp;nbsp;Hardware Addr&amp;nbsp;&amp;nbsp; Type&amp;nbsp;&amp;nbsp; Interface&lt;BR /&gt;Internet&amp;nbsp;&amp;nbsp;192.168.155.34&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;5&amp;nbsp;&amp;nbsp; 3005.5c7c.47f4&amp;nbsp;&amp;nbsp;ARPA&amp;nbsp;&amp;nbsp; Vlan505&lt;BR /&gt;Internet&amp;nbsp;&amp;nbsp;192.168.155.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp; b40c.258e.e401&amp;nbsp;&amp;nbsp;ARPA&amp;nbsp;&amp;nbsp; Vlan505&lt;/P&gt;
&lt;P&gt;Internet &amp;nbsp;192.168.155.10 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- &amp;nbsp; 001a.6d55.fc42 &amp;nbsp;ARPA &amp;nbsp; Vlan505&lt;/P&gt;</description>
      <pubDate>Tue, 22 Mar 2016 14:08:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-mac-address-filtering/m-p/2892368#M155412</guid>
      <dc:creator>Garage Irvine</dc:creator>
      <dc:date>2016-03-22T14:08:52Z</dc:date>
    </item>
    <item>
      <title>And this don't work either:</title>
      <link>https://community.cisco.com/t5/network-security/vlan-mac-address-filtering/m-p/2892369#M155414</link>
      <description>&lt;P&gt;And this don't work either:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;mac access-list extended not-secure&lt;BR /&gt;permit any any&lt;BR /&gt;mac access-list extended secure&lt;BR /&gt;permit host 0800.27a5.05c5 any&lt;BR /&gt;permit any host 0800.27a5.05c5&lt;BR /&gt;permit host 3c97.0e26.f302 any&lt;BR /&gt;permit any host 3c97.0e26.f302&lt;BR /&gt;permit host b40c.258e.e401 any&lt;BR /&gt;permit any host b40c.258e.e401&lt;BR /&gt;permit host 001a.6d55.fc42 any&lt;BR /&gt;permit any host 001a.6d55.fc42&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;vlan access-map block_hosts 10&lt;BR /&gt;action drop&lt;BR /&gt;match mac address not-secure&lt;BR /&gt;vlan access-map block_hosts 20&lt;BR /&gt;action forward&lt;BR /&gt;match mac address secure&lt;BR /&gt;match ip address allow&lt;BR /&gt;!&lt;BR /&gt;vlan filter block_hosts vlan-list 505&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;lldp run&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended allow&lt;BR /&gt;permit ip any any&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Maybe debugging would help? Don't know what to dig really&lt;/P&gt;</description>
      <pubDate>Tue, 22 Mar 2016 14:11:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-mac-address-filtering/m-p/2892369#M155414</guid>
      <dc:creator>Garage Irvine</dc:creator>
      <dc:date>2016-03-22T14:11:21Z</dc:date>
    </item>
    <item>
      <title>I am also seeing the same</title>
      <link>https://community.cisco.com/t5/network-security/vlan-mac-address-filtering/m-p/2892370#M155415</link>
      <description>&lt;P&gt;I am also seeing the same behavior on my 3560X....blacklisting works but white-listing does not...very frustrating.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Model number: WS-C3560X-48T-S&lt;/P&gt;
&lt;P&gt;SW Version:&amp;nbsp; 12.2(58)SE2&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jun 2017 21:32:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-mac-address-filtering/m-p/2892370#M155415</guid>
      <dc:creator>Dan Smith</dc:creator>
      <dc:date>2017-06-05T21:32:15Z</dc:date>
    </item>
    <item>
      <title>Re: And this don't work either:</title>
      <link>https://community.cisco.com/t5/network-security/vlan-mac-address-filtering/m-p/4444379#M1082710</link>
      <description>&lt;P&gt;Been a long while since you posted your quandary with the creation of a "MAC whitelist" on your Cisco equipment - the creation of which is something I am looking into also, and the technical documentation for it online is scarce.&amp;nbsp; Were you ever successful in creating it?&amp;nbsp; If so, what was the actual method you ended up using...?&amp;nbsp; Thx&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Aug 2021 17:50:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-mac-address-filtering/m-p/4444379#M1082710</guid>
      <dc:creator>jsnyder0111</dc:creator>
      <dc:date>2021-08-04T17:50:21Z</dc:date>
    </item>
  </channel>
</rss>

