07-24-2024 11:30 PM
Hello,
Anyone can make me mor understand about traffic direction in physical interface and vlan interface?
Scenario 1:
Router Interface g0/1 connected to LAN, and Interface g0/2 connected to INTERNET. When i assign output QoS Policy on interface g0/2, which one will be as source?
Scenario 2:
I have VLAN 100 with subnet 10.7.100.0/24 then I want to apply access-group IN on this VLAN. When creating extended access list should i entry permit ip 10.7.100.0 0.0.0.255 any, or permit ip any 10.7.100.0 0.0.0.255 for example?
Solved! Go to Solution.
07-25-2024 06:29 AM - edited 07-25-2024 06:30 AM
Hmm, so far none of the replies appear to answer your specific questions.
For scenario 1, source would be LAN IPs.
For scenario 2,
permit ip 10.7.100.0 0.0.0.255 any
07-24-2024 11:48 PM
check from my notes :
IN any packet coming to the router is considered as inbound.
OUT any packet going out of the router is considered as outbound.
in acl, we usually use it at interface,
any packet entering to interface is considered as inbound by ACL.
any packet leaving out of interface is considered as outbound by ACL
07-25-2024 04:38 AM - edited 07-25-2024 06:14 AM
@balaji.bandi is correct.
For SVIs, think of OUT as toward VLAN's subnet IPs and IN as from VLAN's subnet IPs.
Or, think of a L2 switch connected to a router. IN and OUT would be the same as for router's physical interface.
07-25-2024 04:50 AM
07-25-2024 05:30 AM - edited 07-25-2024 06:08 AM
BTW, what @MHM Cisco World is showing is correct.
07-25-2024 05:32 AM - edited 07-25-2024 06:31 AM
Thanks
MHM
07-25-2024 06:07 AM - edited 07-25-2024 11:57 AM
@MHM Cisco World wrote:
it for SVI ACL not for physical
please be sure again before answerMHM
Yup, it's I who had it backwards!
Corrected my other replies.
Thank you.
PS:
BTW, do try to be sure of my replies, but I do get it wrong, occasionally. One nice thing about these forums, with an implicit "peer review", incorrect information usually gets called out.
07-25-2024 11:09 PM
In this pic when i want to denied some hosts under vlan 10 to vlan 20 by configure access-group IN on vlan 20, the ACL should be deny ip host 10.10.10.10 any or deny ip any host 10.10.10.10?
07-26-2024 01:10 AM - edited 07-26-2024 03:10 AM
deny ip any host 10.10.10.10 <<- if it config under vlan 20 direction IN
MHM
07-26-2024 03:05 AM - edited 07-26-2024 09:13 AM
@MHM Cisco World wrote:
deny ip host 10.10.10.10 any
Because Inbound for SVI of from host in same subnet of SVI not from different subnet.
MHM
After my last flub, it's with trepidation I ask, wouldn't the answer be deny ip any host 10.10.10.10?
OP asked for an in ACL on VLAN 20 SVI. So, such an ACL would need to block return traffic from VLAN 20 (src) to VLAN 10 (dst), yes?
07-26-2024 03:07 AM - edited 07-26-2024 03:08 AM
Get it
Thanks
MHM
07-26-2024 05:19 AM
@hs08 just some other options for using those two ACEs. . .
deny ip host 10.10.10.10 any
Could be used as an in for SVI 10, where it blocks the host from sending any traffic out of VLAN 10
Could also be used as an out for SVI 20 where it blocks VLAN 20 from receiving any traffic from that one host.
deny ip any host 10.10.10.10
Could be used as an in for SVI 20, where it blocks all of VLAN 20 from sending any traffic to that host.
Could also be used as an out for SVI 10 where it blocks that host from receiving any traffic external to VLAN 10.
Remember a single ACL applies to one direction of traffic but traffic can be bidirectional (although bidirectional conversations are broken even if just one direction is blocked). So, to guarantee no traffic, you would need two ACLs.
Next, keep mind the scope of any. As above, its implied scope changes when applied on SVI 10 vs. 20. This issue can be negated by using a specific network.
For example, rather than
deny ip host 10.10.10.10 any
perhaps
deny ip host 10.10.10.10 10.10.20.0 0.0.0.255
Lastly, an old recommendation of ACL applications is, to drop traffic ASAP. This would suggest using an in ACL, but if blocking bidirectional traffic, related in ACL ACEs relationships, on different interfaces (possibly on different devices), can be easily overlooked. So, for maintainability, an in and out on the same interface can be better. (For a case of a specific host, often its gateway interface might be the better choice, as the ACL, logically, is near the targeted host.)
07-25-2024 06:29 AM - edited 07-25-2024 06:30 AM
Hmm, so far none of the replies appear to answer your specific questions.
For scenario 1, source would be LAN IPs.
For scenario 2,
permit ip 10.7.100.0 0.0.0.255 any
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide