cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1188
Views
0
Helpful
6
Replies

Extended Access list in VLAN issue

tunxt99
Level 1
Level 1

Hi there,

My device is CBS350-24FP-4G.

My topology:

VLAN 101 Application 172.30.101.0/24

VLAN 102 Staffs 172.30.102/24

VLAN 103 Bastion 172.30.103.0/24

I'm trying to create an extended ACL to allow a specific IP in VLAN 103 able to SSH to all IP in VLAN 101, others deny.

You can see on my attached image

tunxt99_0-1679285657408.png

tunxt99_2-1679285683991.png

But the ACL didn't work, when I chose "Default Action" to "Deny Any", my machine with IP 172.30.103.99 in VLAN 103 couldn't SSH to machine in VLAN 101. On other hand, "Permit Any" allows all VLAN to SSH to machine in VLAN 101.
Please help me to figure out what's wrong with my configuration.

Thank you!

1 Accepted Solution

Accepted Solutions

KJK99
Level 3
Level 3

@tunxt99 

I feel your pain. On those switches, the direction of service ACLs is always IN. Here’s what the manual says.

“When an ACL is bound to an interface, its ACE rules are applied to packets arriving at that interface.”

Note that those packets arrive from the VLAN you bind the ACL to so the source IP address in ACEs needs to be from the subnet of that VLAN. Therefore, your permit rule with source IP address of 172.30.103.99 should not be bound to the interface of VLAN101 (Subnet 172.30.101.0/24).

It is unfortunate that CISCO with their CBS series of switches follows the path of other small business switch manufactures providing too limited ACL rule set. I usually find workarounds to those limitation, but the end result is not pretty and is difficult to maintain. Since I’m also a server admin for my network, sometimes I just patch a hole using server firewalls.

Kris K

View solution in original post

6 Replies 6

Hello


@tunxt99 wrote:

I'm trying to create an extended ACL to allow a specific IP in VLAN 103 able to SSH to all IP in VLAN 101,


Try the following acl:

ip access-list extended VL103-SSH_Host
permit tcp host 172.30.103.99 any eq 22
deny  tcp 172.30.102.0 0.0.0.255 any eq 22
deny  tcp 172.30.103.0 0.0.0.255 any eq 22
permit ip any any

int vlan 101
ip access-group  VL103-SSH_Host OUT


Please rate and mark as an accepted solution if you have found any of the information provided useful.
This then could assist others on these forums to find a valuable answer and broadens the community’s global network.

Kind Regards
Paul

Hello Paul,

Thank you for your response. My switch doesn't has command as you shown but I believe I did the same thing as yours. It's still not working as my expected.

tunxt99_0-1679303927867.png

tunxt99_2-1679304305250.png

Hello
looks like the service-acl is in the wrong direction relating to the access-list it is calling, try service-acl output  if not change the acl to read the other away around

ip access-list extended VL103-SSH_Host
permit tcp any  host 172.30.103.99 eq 22
deny  tcp any host 172.30.102.0 0.0.0.255 eq 22
deny  tcp  any 172.30.103.0 0.0.0.255 eq 22


FYI -

SVI acl logic
IN = traffic originating from within the vlan
OUT =  traffic originating outside the vlan


Please rate and mark as an accepted solution if you have found any of the information provided useful.
This then could assist others on these forums to find a valuable answer and broadens the community’s global network.

Kind Regards
Paul

Hello Paul,

ACLs that apply to VLAN don't have option OUTPUT as you mentioned, only apply for PORT. Please help me. Thank you.

tunxt99_0-1679306534958.png

tunxt99_1-1679306557759.png

KJK99
Level 3
Level 3

@tunxt99 

I feel your pain. On those switches, the direction of service ACLs is always IN. Here’s what the manual says.

“When an ACL is bound to an interface, its ACE rules are applied to packets arriving at that interface.”

Note that those packets arrive from the VLAN you bind the ACL to so the source IP address in ACEs needs to be from the subnet of that VLAN. Therefore, your permit rule with source IP address of 172.30.103.99 should not be bound to the interface of VLAN101 (Subnet 172.30.101.0/24).

It is unfortunate that CISCO with their CBS series of switches follows the path of other small business switch manufactures providing too limited ACL rule set. I usually find workarounds to those limitation, but the end result is not pretty and is difficult to maintain. Since I’m also a server admin for my network, sometimes I just patch a hole using server firewalls.

Kris K

Hi Kris K,

Thank you so much for your sharing. 

Review Cisco Networking for a $25 gift card