03-16-2015 11:04 AM
Hello,
I’m using Cisco SG500 in layer 3 mode and created different VLANs. Now I want to create IPv4 based ACLs and apply to those VLANs to restrict access.
The VLANs are as per below.
I’m using built-in DHCP server feature of SG500 so all DHCP Pools are configured on the switch itself.
Now I want all members within workstation VLANs to get IPs from the DHCP Pool and only access Internet & Servers and nothing else.
Also, I want all members with in Guest VLAN to get IPs from their DHCP Pool and access only Internet and nothing else.
Is anybody show me how to configure IPv4 based ACLs with minimum ACEs for above scenario? but using only web GUI interface as I don’t have knowledge of CLI.
Thanks in anticipation.
Aniket
Solved! Go to Solution.
03-17-2015 01:31 AM
Hi Aniket,
Since the destination IP address to the internet sites is unknown and traffic to other VLANs can be summarize 10.0.0.0/8 I would do one ACL and use it to bind to all VLANs
10 deny src any dst 10.0.0.0/8
20 permit any any
Note: this ACL would also prevent workstations from communicate between each other inside the same VLAN.
If this is not desired scenario than there needs to be ACE added to allow traffic within VLAN just above deny.
Please find below document which can guide you through Web GUI configuration:
http://sbkb.cisco.com/CiscoSB/ukp.aspx?vw=1&docid=1a4bb16b5d00434da5f6095746775abe_IPv4_Based_ACL.xml&pid=2&respid=0&snid=4&dispid=0&cpage=search
Regards,
Aleksandra
03-23-2015 06:20 AM
Hi Anitket,
In such a scenario it needs to be "permit" source any and destination specific for each VLAN just above "deny rule" That would imply that there would be different ACL for each VLAN.
I hope this helps.
Aleksandra
03-17-2015 01:31 AM
Hi Aniket,
Since the destination IP address to the internet sites is unknown and traffic to other VLANs can be summarize 10.0.0.0/8 I would do one ACL and use it to bind to all VLANs
10 deny src any dst 10.0.0.0/8
20 permit any any
Note: this ACL would also prevent workstations from communicate between each other inside the same VLAN.
If this is not desired scenario than there needs to be ACE added to allow traffic within VLAN just above deny.
Please find below document which can guide you through Web GUI configuration:
http://sbkb.cisco.com/CiscoSB/ukp.aspx?vw=1&docid=1a4bb16b5d00434da5f6095746775abe_IPv4_Based_ACL.xml&pid=2&respid=0&snid=4&dispid=0&cpage=search
Regards,
Aleksandra
03-17-2015 06:24 PM
Thanks Aleksandra
What rule (ACE) I should add so that workstations can communicate with each other inside the same VLAN?
03-23-2015 06:20 AM
Hi Anitket,
In such a scenario it needs to be "permit" source any and destination specific for each VLAN just above "deny rule" That would imply that there would be different ACL for each VLAN.
I hope this helps.
Aleksandra
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide