10-23-2022 12:01 PM
Hi,
I am having some issue with IPv4 based ACE rules. Basically 3 VLAN's 192.168.20.0/24(VLAN20, 192.168.40.0/24(VLan40), 192.168.55.0/24(VLAN 55). Vlan20 is office net, Vlan 40 is guest, Vlan 55 is default route subnet to firewall. all traffic should be allowed Firewall access. I want to deny all traffic from Vlan 40 to Vlan 20. I want to deny all traffic vlan 20 to vlan 40 except some web services on 192.168.40.114:32400 TCP
I have no issues setting up the deny traffic but am struggling getting the permit traffic rule to work. I am binding the ACL to Vlan 20 and 40 as default deny as well
Solved! Go to Solution.
10-24-2022 10:37 AM
Sure - that is the reason i suggested as below
"Either you need to granular rules like what port you looking to allow. example 80 or 443 and so on, to make a strict rule"
So remove from web server to Local pool permit, and add only required ports and test it.
10-23-2022 12:16 PM
How about adding another permit rule from the 192.168.40.114 to the 192.168.20.0 network? is that works ?
10-23-2022 12:35 PM
10-23-2022 12:39 PM
Actually, that last attempt I had the subnet wrong. I fixed to 0.0.0.225 and it works. Thanks 40.114 now has access to 20.0/24 now which I don't want. how do I fix that?
10-24-2022 07:12 AM
This ACL, Device is not FW so it is not a stateful Firewall to remember your connection - so that is a limitation with ACL.
either you need to granular rules like what port you looking to allow. example 80 or 443 so on, to make strict rule.
10-24-2022 10:27 AM
I not sure about this solution of having network open in both direction to get the permit rule to work. In this thread the user was able to get it to work for permitting traffic in one direction only.
https://community.cisco.com/t5/small-business-switches/acl-config-on-sg-300-28p/td-p/1858212
10-24-2022 10:37 AM
Sure - that is the reason i suggested as below
"Either you need to granular rules like what port you looking to allow. example 80 or 443 and so on, to make a strict rule"
So remove from web server to Local pool permit, and add only required ports and test it.
10-24-2022 10:42 AM
10-24-2022 10:53 AM
First, check 192168.40.114 port 32400 listenings, and change the source port to any
10-24-2022 11:06 AM
still not working.
10-24-2022 12:44 PM
still not working.
nice to have more information on what is not working. totally broken? or one side working.?
First, check 192168.40.114 port 32400 listening - is this working (I believe and take as working)?
Can you post again the screenshot of ACE and what firmware you running? enable Logging and check what is the error you get?
10-24-2022 01:10 PM
I think I finally understand how it works. Thanks for the tip on the logging, it showed me more clearly what ports were traversing the rules and failing.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide