04-23-2020 07:29 PM - edited 04-23-2020 07:30 PM
Hi guys,
For the purposes for NAT overload, if had my "outside" interface as Gi0/0 and my "inside" interface as VLAN120; and I wanted to police ingress traffic to an IP address in VLAN120 using an ACL with the inside local address as the destination...
Here's some config/diagrams to illustrate my dilemma:
Option 1 - Policy on Gi0/0
Option 2 - Policy on VLAN120
Thanks in advance!
Solved! Go to Solution.
04-23-2020 08:35 PM
Hi @phosgene
You need to understand order of operation to successfully implement traffic policing. According to https://etherealmind.com/cisco-ios-order-of-operation/ policing is done before NAT. So in your case you'd apply policy-map to Vlan interface - option #2.
It looks to me your ACL (option #2) referring to different subnet than your VLAN 120 interface. It should've been
permit ip any 10.10.120.0 0.0.0.255
Verification:
sh policy-map int Vlan 120
Let us know if it worked out.
04-23-2020 08:35 PM
Hi @phosgene
You need to understand order of operation to successfully implement traffic policing. According to https://etherealmind.com/cisco-ios-order-of-operation/ policing is done before NAT. So in your case you'd apply policy-map to Vlan interface - option #2.
It looks to me your ACL (option #2) referring to different subnet than your VLAN 120 interface. It should've been
permit ip any 10.10.120.0 0.0.0.255
Verification:
sh policy-map int Vlan 120
Let us know if it worked out.
04-23-2020 08:43 PM
Thanks Abzal,
That's exactly what i was looking for.
ACL was a typo. :)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide