cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
879
Views
5
Helpful
4
Replies

VLAN Access Control List for Ip-Helper Output from ISR4431 - Broadcast to Unicast Output Control on Private Network

I am forwarding two ports of broadcast UDP data from an inside private network VLAN (VLAN 100) to two outside private networks via WAN connections on an ISR4431.  The broadcast forwarding seems to work using the ip-helper addresses in the VLAN.  The sources of the broadcast data are also NAT'd to the sources on the WAN ports.  I am wanting to separate the packets to their appropriate outside private networks.  However, I am having an issue with both ports of UDP data on both networks, port 5207 is from source 10.1.1.87 , this belongs on the 10.194.234.0 network and port 6001 is from source 10.1.1.99 and belongs on the 10.0.1.0 network.  I have tried several iterations of extended access control lists on the VLAN output to control that data from each source to the WAN connections.  I am currently at a loss.  I have tried standard access lists on the two WAN ports with no affect, as well.   I have attached relevant part of myconfiguration.  Any and all comments and/or suggestions are welcome.  

!
vtp mode transparent
!
vlan internal allocation policy ascending
!
vlan 100
interface GigabitEthernet0/0/0
ip address 10.0.1.33 255.255.255.0
ip nat outside
negotiation auto
no shutdown
!
interface GigabitEthernet0/0/1
ip address 10.194.234.1 255.255.255.0
ip nat outside
negotiation auto
no shutdown
!
interface Vlan100
ip address 10.1.1.190 255.255.255.0
ip helper-address 10.194.234.99
ip helper-address 10.0.1.210
ip nat inside
ip access-group V100OUT in
no shutdown
!
ip nat inside source static 10.1.1.87 10.194.234.1
ip nat inside source static 10.1.1.99 10.0.1.33
!
ip forward-protocol udp 5207
ip forward-protocol udp 6001
!
ip access-list extended V100OUT
permit udp host 10.1.1.0 host 10.1.1.255
permit udp host 10.1.1.87 host 10.156.51.226
permit udp host 10.1.1.99 host 10.0.1.210

 

 

4 Replies 4

I noticed I had a typo in the access list..... here is the correct one.   

ip access-list extended V100OUT
permit udp host 10.1.1.0 host 10.1.1.255
permit udp host 10.1.1.87 host 10.156.51.99
permit udp host 10.1.1.99 host 10.0.1.210

 

My issue is still present.    

I find it difficult to fully understand your description of the issue. But I think I understand that the important part is that you want to forward broadcast packets of UDP port 5207 to 10.194.234.99 but not to 10.0.1.210 and you want to forward broadcast packets of UDP port 6001 to 10.0.1.210 but not to 10.194.234.99. Is that correct? Unfortunately I don't know of any way to do that. When you use multiple helper addresses to forward broadcasts to multiple destinations then helper address forwards copies of each broadcast to each of the configured destinations. I do not know of any way to make the forwarding selective.

 

I assume this means that you will not need the access list that you configured. But just in case you do want to use it for something I have these comments about the access list.

permit udp host 10.1.1.0 host 10.1.1.255

This line will look for packets with source address of 10.1.1.0 but there will be no packets with that source address. This is the network address for the subnet and no host will use that address.
permit udp host 10.1.1.87 host 10.156.51.99

This line has a source address that makes sense but I do not understand the destination address. There is no mention in your description of 10.156.51.99
permit udp host 10.1.1.99 host 10.0.1.210

This line is the only one that correctly relates to your configuration of helper addresses.

I will also point out that in an extended access list there is an implied las line which is deny any any. So if you apply this access list to interface vlan 100 as an inbound filter that only packets explicitly permitted will be forwarded and so all the other traffic from all the hosts in vlan 100 will be denied. 

HTH

Rick

You are correct.  My posted configuration is not what works.  I tried to sanitize it a bit and I think I might have confused the situation.  I will try to clarify what I am dealing with and the current results,  along with the unwanted artifacts on the two outside networks:

 

From the inside private network src: 10.1.1.99 dest 10.1.1.255 port 6001 broadcast UDP with ip-helper in vlan 100 of 10.0.1.210 & ip forward 6001, results in outside private network unicast udp output from G0/0/1 src: 10.0.1.33 dest: 10.0.1.99 port 6001 (this is intended).  I also have src: 10.194.234.1 dest 10.0.1.210 port 5207 packets on this network.  These packets are not wanted on this outside network.

 

From the inside private network src:10.1.1.87 dest 10.1.1.255 port 5207 broadcast UDP with ip-helper in vlan100 of 10.194.234.99 & ip forward of 5207, results in outside private network unicast udp output from G0/0/1 src: 10.194.134.1 dest of 10.194.234.99  port 5207 (works as intended). I also have src: 10.0.1.99 dest 10.194.234.99 port 6001 packets on this network.  These packets are not wanted on this outside network.

 

I'm looking for a way to selectively filter via access-list or some method the packets in bold from each outside private network.  I have attempted several iterations of extended access-list on the VLAN source, but it is unclear to me since it is a multillayer switch if this is the appropriate location for the access-list.  I have also attempted standard access-lists on the G0/0/0 and G0/0/1 ports, as well.  This had no change either.  I'm looking for any and all suggestions.  They are most welcome and appreciated!

 

 

 

Hi,

  

     You can't fix this with NAT or PBR, it's an inherent flaw of the "ip helper-address" feature which doesn't really have options. Both broadcast packets, so from both 10.1.1.99 and 10.1.1.87 will be wrapped into unicast and sent to both configured "helper-addresses"; if the traffic matches any other features, like NAT or QoS, or whatever else, it will apply those features but still leave the router. You have two solutions:

        - preferred one is to split the two hosts sending broadcasts into two different VLAN's and thus have one "helper-address" configured per VLAN

        - as a workaround, configure an outbound ACL on each of your egress interfaces and deny traffic which you want to forbid ( i also recommend to change your NAT segments to use UDP, since you're using the router's interface to statically NAT into)

 

ip access-list FIRST_EXIT

  deny udp host 10.0.1.33 host 10.194.234.99

  permit ip any any

!

interface  GigabitEthernet0/0/1

 ip access-group FIRST_EXIT out

!

!

ip access-list SECOND_EXIT

  deny udp host 10.194.234.1 host 10.0.1.210

  permit ip any any

!

interface  GigabitEthernet0/0/0

 ip access-group SECOND_EXIT out

 

 

Regards,

Cristian Matei.

Review Cisco Networking for a $25 gift card