09-13-2019 04:01 AM
Hi everyone, I come across with an issue I did nont expected and honestly I do not know how I can resolve it without impacting the whole network desing.
Basically I have three vlan,10,20,30 with their respective subnets: 172.28.28.0/24,172.28.29.0/24 and 172.28.30.0/24.
Everything is working fine so far. Thing is that we set the configuration of a NIC card on a PC within the vlan 20 whose IP address is 172.28.29.10 and by mistake we set the subnet mask to a 255.255.0.0 instead of a /24 as it should be.
Our problem is that we can ping all the vlans even if we set a wrong subnet mask.
Is it possible to filter traffic from the /16 mask allowing traffic from the /24 mask?
Topology is : three access switches (one for each vlan) connected in trunk to a L3-SWITCH in which there are three SVI interfaces for performing intevlan-routing.
Thanks in advance
Solved! Go to Solution.
09-14-2019 11:22 AM
If I am understanding correctly the issue with the access list is that as configured the access list is checking for an incorrectly configured IP address (looking for a source address that is not in 172.28.29). But the problem is not about the configured address but is about the mask. I do not know of a way to use an access list and detect anything about the configured mask.
In reading the discussion I wondered if the issue might be that the PC configured with a /16 would simply arp for destinations, and if it received an arp response then it simply forwards the packets with the appropriate host mac address (which avoids the IP forwarding logic of the interface). If this really is the issue then perhaps the solution would be to disable proxy arp on the interface. This would allow arp to locally connected devices but not to devices in other subnets.
But as I think about the original post I am not at all clear about what the problem really is. We have this statement "Our problem is that we can ping all the vlans even if we set a wrong subnet mask". Does that imply that there are some destinations that should not be reachable from 172.28.29? If so please identify what these destinations are. Once we know what destinations should not be reachable it should be possible to write an access list that will deny access to those destinations and permit access to others. Please provide clarification about what the problem really is.
HTH
Rick
09-13-2019 04:33 AM
Hello,
use an access list. The order is important If you allow the 172.16.x.0/24 network in the first statement, and then deny 172.16.0.0/16 in the next, the /24 network will be allowed.
If you don't know how to do that, post the running configuration of your L3 switch, and indicate what exactly you want to block, and what to allow.
09-13-2019 05:43 AM
09-13-2019 05:38 AM - edited 09-13-2019 06:03 AM
Hello
Not sure i understand - Please confirm
You set an subnet mask of a single host pc which incorporates /16 network range instead or a /24 and you wish to negate this host from pinging or accessing you whole network?
So why would this single act impact you whole network, are you wanting to limit access between your vlans and deny anything else?
09-13-2019 06:23 AM
09-14-2019 11:22 AM
If I am understanding correctly the issue with the access list is that as configured the access list is checking for an incorrectly configured IP address (looking for a source address that is not in 172.28.29). But the problem is not about the configured address but is about the mask. I do not know of a way to use an access list and detect anything about the configured mask.
In reading the discussion I wondered if the issue might be that the PC configured with a /16 would simply arp for destinations, and if it received an arp response then it simply forwards the packets with the appropriate host mac address (which avoids the IP forwarding logic of the interface). If this really is the issue then perhaps the solution would be to disable proxy arp on the interface. This would allow arp to locally connected devices but not to devices in other subnets.
But as I think about the original post I am not at all clear about what the problem really is. We have this statement "Our problem is that we can ping all the vlans even if we set a wrong subnet mask". Does that imply that there are some destinations that should not be reachable from 172.28.29? If so please identify what these destinations are. Once we know what destinations should not be reachable it should be possible to write an access list that will deny access to those destinations and permit access to others. Please provide clarification about what the problem really is.
HTH
Rick
09-17-2019 07:00 AM
Hi Richard,
First of all, I would like to thank you for your support and for your time, thanks a lot.
It seems to be that you did understand well the issue because when I applied the config that you thought it might work (disabling proxy-arp) ,well, guess what, it worked !!!.
So after performing further tests, once a misconfigured netmask is set on any PC of the 172.28.29.x/24 subnet, it does not reach any other subnet as expected,only a correct setting of a subnet mask would do.
With regards to inter-vlan routing, I should say that is working fine applying the proper access list to allow/deny traffic from other subnets as per design requirements.
Well Richard what else can i say? TOP PLAYER.
Muchas Gracias
09-17-2019 08:22 AM
You are welcome. I am glad that our suggestions have been helpful. One of the benefits of this community is that you may have several people looking at the issue and offering their perspective. In my experience several sets of eyes looking at it are frequently beneficial. Thank you for marking this question as solved. This will help other participants in the community to identify discussions which have helpful information. This community is an excellent place to ask questions and to learn about networking. I hope to see you continue to be active in the community.
HTH
Rick
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide