08-06-2018 05:01 AM - edited 03-05-2019 10:50 AM
Hello,
could someone please help me creating an ACL to allow only Internet traffic on GUEST VLAN?
DHCP/DNS Server IP: 192.168.1.247
Firewall IP: 192.168.1.1
GUEST VLAN: 192.168.12.0/24
This is what I am doing:
ip access-list extended GUEST
permit udp any host 192.168.1.247 eq 67
permit udp host 192.168.1.247 any eq 68
permit udp 192.168.12.0 0.0.0.255 host 192.168.1.247 eq 53
permit tcp 192.168.12.0 0.0.0.255 host 192.168.1.247 eq 53
permit tcp 192.168.12.0 0.0.0.255 host 192.168.1.1 eq 80
permit tcp 192.168.12.0 0.0.0.255 host 192.168.1.1 eq 443
deny ip any any
Interface VLAN 12
IP Access-group GUEST in
what am I doing wrong??
Thank you in advance
Swaydan
08-06-2018 05:07 AM
Hello,
I made some changes/additions to your access list:
ip access-list extended GUEST
permit udp any host 192.168.1.247 eq 67
permit udp host 192.168.1.247 any eq 68
permit udp 192.168.12.0 0.0.0.255 host 192.168.1.247 eq 53
permit tcp 192.168.12.0 0.0.0.255 host 192.168.1.247 eq 53
permit tcp 192.168.12.0 0.0.0.255 host 192.168.1.1 eq 80
permit tcp 192.168.12.0 0.0.0.255 host 192.168.1.1 eq 443
deny ip 192.168.12.0 0.0.0.255 10.0.0.0 0.255.255.255
deny ip 192.168.12.0 0.0.0.255 172.0.0.0 0.31.255.255
deny ip 192.168.12.0 0.0.0.255 192.168.0.0 0.0.255.255
permit ip 192.168.12.0 0.0.0.255 any
08-06-2018 05:18 AM
Hello Georg,
Thank you for your reply
However with this Configuration "permit ip 192.168.12.0 0.0.0.255 any", VLAN 12 will have full Access to Firewall, i want to grant it only web traffic.
Thank you
08-06-2018 05:24 AM
Hello,
use:
permit tcp 192.168.12.0 0.0.0.255 any eq www
as the last line instead.
08-06-2018 05:25 AM - edited 08-06-2018 05:26 AM
rip that line out, so the implicit deny any falls out the bottom of your ACL,
add
permit tcp 192.168.12.0 0.0.0.255 any eq 443 / 80 on top of your denies
08-06-2018 06:16 AM
I ended up using the below, but it is not secure, as VLAN 12 are able to access any internal web server! through the following line "permit tcp any any eq 80 / 443" :(
ip access-list extended GUEST
permit udp any any eq 67
permit udp any any eq 68
permit udp any host 192.168.1.247 eq 53
permit tcp any host 192.168.1.247 eq 53
permit tcp any any eq 80
permit tcp any any eq 443
deny ip any any
Thank you
08-06-2018 06:22 AM
Hello,
what are the IP addresses of the internal web servers ? Put a deny statement specifying these addresses above the permit any any...
08-06-2018 06:34 AM
Ok, i can live with this :)
However, i am still facing a DHCP issue when i remove "any any" from "permit udp any any eq 67 / 68"!
is there any security issue if i keep it with "any any"?
Thank you
08-06-2018 07:03 AM
Hello,
basically, you only allow DHCP traffic from hosts on the subnet, so there is no security risk.
Instead of:
permit udp any any eq 67
permit udp any any eq 68
you could also use:
permit udp any eq bootpc any eq bootps
08-08-2018 05:03 AM
Hello Georg,
Sorry for the late feedback.
we can consider the DHCP/DNS issue fixed, but i am facing an issue with internet access, the below two lines only allow http and https access through browsers, but all other applications such as Whatsapp, are not working!
permit tcp any any eq 80
permit tcp any any eq 443
Any suggestions?
Thanks a lot
Ali
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide