cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
711
Views
10
Helpful
7
Replies

Extended ACL don't work

HenryNguyen89
Level 1
Level 1

I have this topology like this.

Vlan 116: can ping to DHCP Server (10.125.115.254)

Other Vlan (118, 120, 121) cannot ping to DHCP server, just block icmp protocol.

And my command as below:

access-list 100 permit icmp 10.125.116.0 0.0.0.255 host 10.125.115.254

access-list 100 deny icmp any host 10.125.115.254

access-list 100 permit ip any any

Then apply this ACL to port G1/0/22: 

ip access-list 100 out

HenryNguyen89_1-1669013920525.png

After that, nothing happen. All of Vlan still ping to DHCP server.

Somebody help me

 

 

 

1 Accepted Solution

Accepted Solutions

Yes but if the VLAN is Server VLAN so the direction must be OUT not IN

NOTE:- you can apply ACL under SVI of VLAN if the inter-VLAN done in SW not in router, if the inter-VLAN done in router then you need to apply ACL in subinterface.

View solution in original post

7 Replies 7

HenryNguyen89
Level 1
Level 1

And DHCP server is belong to Vlan 115.

G1/0/22: 

switchport mode acc

switchport acc vlan 115

ip access-group 100 out

This interface is l2 so access list not work here.

Apply acl on subinterface or svi of vlan

So you mean i need to apply ACL to Vlan 115?

int vlan 115

ip access-group 100 in

Like this? Right?

Yes but if the VLAN is Server VLAN so the direction must be OUT not IN

NOTE:- you can apply ACL under SVI of VLAN if the inter-VLAN done in SW not in router, if the inter-VLAN done in router then you need to apply ACL in subinterface.

Ok, it work.

Thanks man.

you are so so welcome 

Hello,

post your zipped Packet Tracer project (.pkt) file...

Review Cisco Networking for a $25 gift card