cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1467
Views
0
Helpful
5
Replies

SG300-28 Reflexive ACL

Anonymous
Not applicable

Hello,

I have a Cisco SG300-28 in Layer 3 mode and configured routing between VLANs. I have 3 VLANs.

VLAN 10: 10.1.10.0\24

VLAN 20: 10.1.20.0\24

VLAN 99: 192.168.178.0\24

Right now VLAN 10 can communicate with VLAN 20 and VLAN 20 can communicate with VLAN 10.

But now I want VLAN 10 can communicate with any PC in VLAN 20 but VLAN 20 cannot communicate with VLAN 10. I heard this should work with a "reflexive ACL"?! Does the SG300-28 support reflexive ACL?

Thanks

Markus

1 Accepted Solution

Accepted Solutions

Ganesh Hariharan
VIP Alumni
VIP Alumni
Hello,I have a Cisco SG300-28 in Layer 3 mode and configured routing between VLANs. I have 3 VLANs.VLAN 10: 10.1.10.0\24VLAN 20: 10.1.20.0\24VLAN 99: 192.168.178.0\24Right now VLAN 10 can communicate with VLAN 20 and VLAN 20 can communicate with VLAN 10.But now I want VLAN 10 can communicate with any PC in VLAN 20 but VLAN 20 cannot communicate with VLAN 10. I heard this should work with a "reflexive ACL"?! Does the SG300-28 support reflexive ACL?ThanksMarkus

Hello Markus,

Have you seen the below thread which gives better explanation of ACL implementation on SG300.

ACL Implementation on SG300

Hope it Helps..

-GI

View solution in original post

5 Replies 5

Ganesh Hariharan
VIP Alumni
VIP Alumni
Hello,I have a Cisco SG300-28 in Layer 3 mode and configured routing between VLANs. I have 3 VLANs.VLAN 10: 10.1.10.0\24VLAN 20: 10.1.20.0\24VLAN 99: 192.168.178.0\24Right now VLAN 10 can communicate with VLAN 20 and VLAN 20 can communicate with VLAN 10.But now I want VLAN 10 can communicate with any PC in VLAN 20 but VLAN 20 cannot communicate with VLAN 10. I heard this should work with a "reflexive ACL"?! Does the SG300-28 support reflexive ACL?ThanksMarkus

Hello Markus,

Have you seen the below thread which gives better explanation of ACL implementation on SG300.

ACL Implementation on SG300

Hope it Helps..

-GI

Anonymous
Not applicable

Hello Ganesh,

thanks for your reply. The explanation to open just one port is a good idea and helps me in most cases.

But I think it wont help me if I have the following example:

I have 2 Windows-PCs. PC1 is in VLAN 10. PC2 is in VLAN20. I want to copy some files via SMB from PC1 to PC2.

So I have to open the Port(s) for SMB from VLAN10 to VLAN20 and from VLAN20 to VLAN10. The second rule is neccessary to receive the answer packages. But if I open the Ports for VLAN20 to VLAN10  PC2 can access the Shares of PC1 too. And that's what I don't want.

Theirfor I wanted to create a ACE-Rule which only allow Packages from VLAN20 to VLAN10 which where established in VLAN10.

Markus

Hi,

Provided your SMB implementation uses TCP as a transport protocol (natively through port 445 or via NBT through port 139) you can try to filter traffic from VLAN20 to VLAN10 based on ACK or RST flags. You would create an ACL with two "permit tcp" entries using "match-all +ack" and "match-all +rst" parameters respectively.

Best regards,

Antonin

Anonymous
Not applicable

It works now.

I created a ACE with the following parameters in the screenshots.

VLAN20 can now access the SMB-shares from VLAN10 but VLAN10 can't access SMB-shares from VLAN20.

Thanks to both of you!

Is this really works? the way i see it. you still permitted TCP traffic to flow both ways. from vlan 10 to vlan 20. and vlan 20 to vlan 10. Im having the same problem with my SG350 series. most switches uses "permit tcp any any -established-"in CLI. That way vlan will respond only to established connection and cannot start a 3 way handshake.

Review Cisco Networking for a $25 gift card