05-12-2023 07:46 AM
Dear all,
I created an extended access list in the switch to permit only some IPs to access a specific VLAN but it works for a couple of hours then it started to drop all traffic.
Is someone has an idea why this is happening?
ip access-list extended traffic-to-security-lan
10 permit ip 192.168.1.0 0.0.0.255 10.10.20.0 0.0.0.255
20 permit ip host 10.10.1.132 10.10.20.0 0.0.0.255
30 deny ip any any
interface Vlan2300
ip address 10.20.0.254 255.255.255.0
ip access-group traffic-to-security-lan out
05-12-2023 08:26 AM
hi @abdelmadjid.gueffaz since you are trying ACL in some intermediate device with in different network, make sure your traffic traverse through correct path and verify it. since we cannot see your complete network topology, i guess this can be traffic may trying to use different path.
05-12-2023 08:38 AM
The topology is just the firewall and core switch which is 9200 that I am using for the ACL.
and the hosts in this specific Vlan are using the core switch as a gateway 10.20.0.254
05-12-2023 08:32 AM
I would think it would block completely if the IP of the vlan is 10.20.0 but your ACL: only allows 10.10.20.0/24
Unless I am confused on your IP scheme I don't know how anything would be able to exit the vlan with that ACL.
05-12-2023 08:39 AM
it allows only the traffic coming from 192.168.1.0/24 network and the host 10.10.1.132 to access to this vlan
05-12-2023 08:51 AM
But the ACL is traffic out of the vlan, so anything in the vlan can only talk to 10.10.20.0/24 if their IP is 192.168.1.0/24 network and the host 10.10.1.132. anything else would be dropped.
05-12-2023 09:02 AM - edited 05-12-2023 09:03 AM
From what you are saying, you would want to apply it in.
From a port, think of it as in from a client, out to the network, for the vlan think of it as in to the vlan and out from the vlan.
Why it works for an hour or so is odd as it should be stopping as soon as you apply it since the ACL doesn't include established to remain.
05-12-2023 09:48 AM
The ACL works fine for just a couple of hours and then it drops all the traffic with no exception.
05-22-2023 06:56 AM
ACL either works or doesn't - I've never heard (in 23 years of working with IOS) of an ACL stop working after a few hours. IOS bugs do sometimes blow the mind but I doubt that this is one. There are bugs which can cause an ACL to stop working after you make a change in some older IOS and on some platforms ACL can malfunction if not enough TCAM but neither of those happen after a time.
What version of IOS are you using?
As the others have said your description does not match your configuration.
You should probably draw a diagram showing where each subnet and IP is located and which you want to allow/deny.
Generally speaking it's better to apply ACLs inbound rather than outbound - from a security point of view there is no point routing traffic across the router then dropping it outbound, just drop it inbound. Outbound ACLs also don't filter traffic originated on the router itself - a loophole which is often overlooked - whereas an inbound ACL will filter transit and locally destined traffic.
Have you maybe got 10.20.0.0/24 confused with 10.10.20.0/24 ?
05-22-2023 07:49 AM
if you have other L3 device, then there is chance that the traffic never hit this VLAN SVI but hit other l3 device and the traffic allow
and when it hit this VLAN SVI it drop.
10-26-2024 11:37 PM
HI, @abdelmadjid.gueffaz Some switches have limits on the number of ACEs (Access Control Entries) that can be processed or the number of flows they can handle before the ACL behavior degrades. If the switch is reaching a limit, this can cause inconsistent behavior or even start dropping packets unexpectedly. For example, in cisco 2960-X switch supports up to 256ACLs per switch.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide