06-13-2016 01:59 PM - edited 03-08-2019 06:10 AM
Hello all. I have am new to this company and I inherited a few issues. One that I am trying to overcome is this. Our network has multiple VLANs, one being VLAN 8. This VLAN (172.17.8.x) is for our computers in the manufacturing area that are not allowed internet access. That is working fine. However, we have rolled out a new application that is located on our network (MPLS/Metro) in the cloud on a terminal server farm at 172.17.146.x. The application is a shortcut on the desktops that points to that network. It works, however is painfully slow to connect. When I lift the ACL it works fine of course. I need to figure out a way for these systems to connect fast, yet still have no access to the internet. Here is the current ACL:
Extended ACL restricted_ext_access IN
5 permit ip any 198.168.0.0 0.0.255.255 (connects them to mail. works fine)
10 permit ip 172.17.8.0 0.0.0.255 172.16.0.0 0.0.255.255 (connection to old system before update. still needed and works)
20 permit ip 172.17.8.0 0.0.0.255 172.17.0.0 0.0.255.255
30 permit udp any any eq bootps
40 permit udp any any eq bootpc
50 permit udp any eq domain any
60 permit tcp any any eq 5721 (this is for our Kaseya to work and it does)
Like I said with the ACL in place it works, but takes a minute and a half or so to connect. When ACL is not there it is fast. Attached is the ACL and the Sh run for that VLAN interface. The corporate VLAN 5 and 6 work fine, but no ACL for them. I need to keep the VLAN 8 from being able to surf the web, etc. Thanks!
06-13-2016 03:29 PM
Hi
What kind of application you are trying to reach?
Maybe there is some specific ports or access you need to connect while connecting to this app?
Could you add a deny any any statement with log options, just for a specific period in order to check check if you are missing some open ports?
Thanks so much
06-13-2016 05:07 PM
Thanks for the quick reply. The application is called IQMS. All systems connect to it like this:
https://gateway.domainname.com/rdweb
Gateway.domainname.com is the internal ip of 172.17.146.50.
I could try to add the deny any any, but my issue is that the company runs 24x7 but may be able to try it real fast. If I were to do that, where/how do I find the logs? Thanks again
06-13-2016 05:38 PM
If you do deny ip any any log you will find logs by issuing show log on the switch / router. Be careful to add at the last. For that:
- Ip access-list extended restricted_ext_access
100 deny ip any any log
Or you can remove acl from interface, create a test acl matching traffic from your lan to your server and do a debug ip packet 100 (100 will correspond to acl number you've created)
Or monitor traffic by using wireshark
06-13-2016 06:40 PM
So adding the 100 deny ip any any log is in theory the same as the explicit already in place correct? By manually adding it will log what is failing so I can check. What bothers me is that it works so nothing is getting blocked, just slow. I will do this tomorrow if that deny is the same as the explicit already in place. Thanks again!
06-13-2016 07:37 PM
Yes this is same as implicit deny. The thing is that without acl it works perfectly.
I don't see why it slower with acl except that's something is blocked going to your application and may trigger a resend of transactions.
The slow forwarding could be done also from high cpu or TCAM memory...
Did you checked the cpu process just in case but i'll be sure that this part is correct.
Could you also issue the command:
show platform health
06-14-2016 05:33 AM
06-14-2016 09:57 AM
i created a rule for this and it gets permitted, however the issue still remains.
06-14-2016 10:29 AM
That multicast address is used for LLMNR. This protocol is native on Windows machines to perform name resolution without requiring any dns server.
Question very basic, does your dns are working correctly for that specific application from your host when acl is configured?
could you do a nslookup from your machine pointing to your application hostname?
06-14-2016 11:48 AM
06-14-2016 01:03 PM
Yes you can remove the line for LLMNR. Did you checked the TCAM and CPU?
Is it possible to do some debugging on your switch?
the goal would be to create an acl matching traffic from specific host not on vlan 8 and run a debug ip packets on this acl. It's to have a view of what traffic should be allowed while user accessing this website.
The configuration looks like:
access-list 100 permit ip host 172.17.x.x any
access-list 100 permit ip any host 172.17.x.x
debug ip packet 100
06-15-2016 05:12 AM
Thanks for the information. I will try this today and get back with you.
06-16-2016 10:51 AM
I haven't been able to do this yet. I did create an new acl, just about as simple as it can be...
VLAN8_INBOUND -in (not sure if I actually need this)
10 permit ip any any
VLAN_OUTBOUND out
10 deny tcp any eq www any
20 permit ip any any
Some systems work faster than others. I am not sure if it can get any simpler than that. Still, when the ACL is gone, all systems are fast.
06-16-2016 01:41 PM
To the debug, if you create a open acl like you said it will better to view which traffic needs to be allowed and which could be denied when analyzing traces.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide