cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
630
Views
5
Helpful
14
Replies

Using an object group in a reflexive ACL

Josh Mil
Level 1
Level 1

I'm trying to configure some access rules on a 3560CX switch.

This works without using an object group:

ip access-list extended test1
  permit tcp any any 80 reflect reflexive_acl

 

This works without using a reflexive ACL:

object-group service www_ports
  tcp 80
  tcp 443

ip access-list extended test2
  permit object-group www_ports any any

 

But this is not accepted in the console window:

object-group service www_ports
  tcp 80
  tcp 443

ip access-list extended test3
  permit object-group www_ports any any reflect reflexive_acl

 

After the destination address, there is no more option for reflect keyword

SWITCH(config-ext-nacl)# permit object-group www_ports any any ?
  log        Log matches against this entry
  log-input  Log matches against this entry, including input interface
  <cr>

 

I'm wondering whether this is not supported. Thank you.

1 Accepted Solution

Accepted Solutions

Jens Albrecht
Spotlight
Spotlight

Hello @Josh Mil,

you need to distinguish between service object-groups and network object-groups.

It is possible to use network object-groups in reflexive ACLs but you cannot use service object-groups.

BTW, the same limitation applies to IPv6 as well.
Network object-groups can be used on IPv6 reflexive ACLs but service object-groups cannot.

HTH!

View solution in original post

14 Replies 14

Jens Albrecht
Spotlight
Spotlight

Hello @Josh Mil,

you need to distinguish between service object-groups and network object-groups.

It is possible to use network object-groups in reflexive ACLs but you cannot use service object-groups.

BTW, the same limitation applies to IPv6 as well.
Network object-groups can be used on IPv6 reflexive ACLs but service object-groups cannot.

HTH!

Thank you.

If service object group is not supported in reflexive ACLs, is there another way to simplify the code and reduce maintenance work if a group of ports (services) needs to be referenced in multiple reflexive ACLs?

The only way that comes into mind is the use of scripting with Ninja2 templates to create your reflexive ACLs.

Depending on the number of ACLs and devices this could significantly speed up deployment and maintenance.

HTH!

object-group service MY-TCP-PORTS tcp
port-object eq 80
port-object eq 443

!!

ip access-list extended OUTBOUND-FILTER
remark Permit outbound traffic to specific TCP ports
evaluate TCP-REFLEX

permit tcp any any object-group MY-TCP-PORTS reflect TCP-REFLEX timeout 300
deny ip any any log

Try above

MHM

I tried this initially, but after "any any" there is no option to specify object-group.

Excuse me why you need object service if you have only two tcp ports?

Use reflexive without object service. 

And even why you use reflexive, use establish keyword which is more light than reflexive

MHM

Thank you. But establish keyword has some limitations:

1. It works on TCP traffic only. I also need to filter UDP and ICMP.

2. It checks ACK or RST bit, bit doesn't really verify the packet belongs to an established session. An attacker can send a fake packet with ACK bit set, pretending to be the other party of the session.

Point 1 Yes 

Point 2 this SW not FW so we have limit in policy to protect it from attack,

Even if hacker send tcp ACK bit the SW reject it, since it don't have any idea about this tcp session

MHM

Thank you.

Regarding point 2, I always have an impression that inter-vlan routing within a switch is faster than using a firewall. Hence the reason of introducing layer 3 switches into networking. However, if we have to bear with such limitations, then what's the point of using a layer 3 switch?

can we postponed this discussion to later tonight I have something to do 
thanks 

MHM 

Thank you. Apart from this scenario, there are also occasions that we need to allow conditional access between VLANs, as opposed to completely isolating them. For example, Hosts from finance department VLAN need to access a NAS in the marketing department VLAN, but we don't want the NAS initiate sessions to the finance department VLAN. Do we have to route through a router? What's a realistic scenario to use layer 3 switches? If it's just isolating VLANs, why don't we just use layer 2 switches?

What's a realistic scenario to use layer 3 switches? If it's just isolating VLANs, why don't we just use layer 2 switches? <<- can you more elaborate 

MHM