cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1915
Views
0
Helpful
4
Replies

Why should I use a VACL here? i don't see the point

jon.baxter1
Level 1
Level 1

in my example here, what i have in my extended access list is what i want.  so there is no need for the VACL.  what am I missing?  I feel like if I proceed with this and have the explicit deny at the end, then i need to create a long extended list to accommodate all of my ip ranges and vlans.  i apologize if this is a rookie question.  i just cannot find the clarification i need in any forums anywhere.  

 

ip access-list extended CONTROLSACL

permit ip 192.168.17.0 0.0.0.255 172.18.24.0 0.0.0.255

 

vlan access-map Mapping 10

match ip address CONTROLSACL

action forward

 

vlan access-map Mapping 20

action drop

 

vlan filter Mapping vlan-list 1

4 Replies 4

balaji.bandi
Hall of Fame
Hall of Fame

If no other IP range and you like both need to communicate each other, then you do not required VACL.

 

Look at your VLACL you have one way - permit ip 192.168.17.0 0.0.0.255 172.18.24.0 0.0.0.255

 

172.18 can not intiated traffic. back to 192.X is this what requirement we are not sure.

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Hey @jon.baxter1 

 

I feel like if I proceed with this and have the explicit deny at the end, then I need to create a long extended list to accommodate all of my IP ranges and VLANs.

- Here in an extended list, you are matching the desired traffic that you want to allow. So yes only traffic you are permitting in the extended list will be allowed.

- Yes, you need to create a long extended list to accommodate all of my IP ranges and VLANs.

 

Note: As I said this extended list is used to match the traffic, you need to allow traffic in both directions for each IP ranges and VLANs. For example, the list you mentioned above should be like below:

 

ip access-list extended CONTROLSACL

permit ip 192.168.17.0 0.0.0.255 172.18.24.0 0.0.0.255

permit ip 172.18.24.0 0.0.0.255 192.168.17.0 0.0.0.255

 

 

Please rate if you find my answer useful.

Spooster IT Services Team

Cristian Matei
VIP Alumni
VIP Alumni

Hi,

 

     In order to filter IP traffic via IP ACL's, the point of attachment is what gives the name to be a PACL, VACL or RACL:

            - PACL, means Port ACL, an ACL applied on a layer 2 port (access or trunk), which affects ingress traffic (direction is only ingress, cannot be modified)

            - VACL, means VLAN ACL, an ACL applied at the VLAN level, and affects intra-VLAN traffic and also inter-VLAN traffic

            - RACL, means Router ACL, an ACL applied on a layer 3 port (IP address configured), and affects traffic as per the configuration, ingress or egress

 

Technically speaking, you could use any of these to restrict traffic, however:

       - intra VLAN traffic can only be restricted via PACL and VACL as traffic never reaches a default gateway where a RACL may be enforced

      - inter VLAN traffic can be restricted by any of those 3 methods

 

Thus, VACL is preferred against PACL when you need to control intra VLAN traffic in s scalable manner by applying the ACL in a single place, at the VLAN level, as opposed to each port level via PACL.

In your case, as you want to restrict inter VLAN traffic, any of the above methods will work, and yes, there is no need to configure explicit deny entries in the ACL, as long as your configured statements meet your intended policy requirements.

 

Regards,

Cristian Matei.

Hello

What you seem to be doing here is allowing access only between two routed subnets, so a routeed access-list would be applicable., VACLs on the otherhand are used to prohibit intra-vlan communication which isnt what you want to do.

 

Note: the acl logic for SVI routed acl:
IN = orignating within the vlan
Out = originating from outside the vlan

example:
ip access-list extended Vlan172
permit ip 172.18.24.0 0.0.0.255 any

ip access-list extended Vlan192
permit ip 192.168.17.0 0.0.0.255 any

int vlan 192
ip access-group Vlan172 out

int vlan 172
ip access-group Vlan192 out


Please rate and mark as an accepted solution if you have found any of the information provided useful.
This then could assist others on these forums to find a valuable answer and broadens the community’s global network.

Kind Regards
Paul

Review Cisco Networking for a $25 gift card