annuler
Affichage des résultats de 
Rechercher plutôt 
Vouliez-vous dire : 
cancel
629
Visites
0
Compliment
8
Réponses

Need help with access-list on C9300-48U

supportti
Level 1
Level 1

Hello can someone help me im trying to configure an access-list so that only my pc (x.x.x.x) can communicate with host y.y.y.y

 

Here's what ive done 

no ip access-list extended TI_ADMIN
ip access-list extended TI_ADMIN
permit ip host x.x.x.x host y.y.y.y
deny ip any host y.y.y.y
permit ip any any

interface GigabitEthernet5/0/43
description Server y.y.y.y
ip access-group TI_ADMIN out

 

Like that it's working...only my pc can communicate with server y.y.y.y but the problem is that my server y.y.y.y cannot reach any pc anymore

I don't want to limit server y.y.y.y to reach any device on any network

 

Thanks !

8 RÉPONSES 8

check my below comment 

balaji.bandi
Hall of Fame
Hall of Fame

Add another list  as example to get an idea.

ip access-list extended Server-out
permit ip host y.y.y.y  any
!

interface GigabitEthernet5/0/43

ip access-group Server-out in

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Same thing my device cannot ping 8.8.8.8 after and cannot initiate smtp traffic 

Same thing my device cannot ping 8.8.8.8 after and cannot initiate smtp traffic 

what device - what is the IP address ?

ip access-list extended TI_ADMIN
deny ip any host y.y.y.y  - < remove this line and test it

still not working post update ACL and show run int  GigabitEthernet5/0/43

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

When i said my device cannot ping 8.8.8.8 i mean the IDRAC server y.y.y.y

Ive remove the line deny ip any host y.y.y.y in the access-list TI_ADMIN. Now i can ping 8.8.8.8 from IDRAC Server but any pc can reach it

sh access-lists TI_ADMIN
Extended IP access list TI_ADMIN
10 permit ip host 192.168.x.x host 192.168.y.y
20 permit ip any any
sh access-lists SERVERS_OUT
Extended IP access list SERVERS_OUT
10 permit ip host 192.168.y.y any


interface GigabitEthernet5/0/43
description  IDRAC
switchport access vlan 10
switchport mode access
ip arp inspection trust
ip access-group SERVERS_OUT in
ip access-group TI_ADMIN out
spanning-tree portfast
end

this is PACL, 
can you just mention what is connect to this port 192.168.x.x or 192.168.y.y ?

supportti
Level 1
Level 1

192.168.x.x = Windows 10

192.168.y.y = Dell IDrac management server

as I know PACL only accept IN direction not OUT 
anyway
I think about your issue last night, only solution I found for 
make only one Host connect to Server that both in same VLAN and prevent other host of same vlan  from connect 
and make any host in other VLAN connect to server is using VACL 

R3,R2,R4 share same subnet 
I config VACL to make R3 can ping R2 
but 
R4 can not ping R2
AND 
R5 (which is different VLAN) can ping R2.

R1 is GW for both VLAN 

take look to my config 

 
Screenshot (48).pngScreenshot (49).png