cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2207
Views
0
Helpful
10
Replies

ACL with route map

sdurn
Level 1
Level 1

I have a Catalyst 6509 with an ACL that includes a range of IPS with a route-map that work properly.

When you try to add more sentences to this ACL including another IP range, we have seen that new IPs do not work correctly, then removing the ACL in order to restore the initial situation, another IP range not including in ACL lost network connection.

The ACL with the route map defined is:

access-list 160 permit ip 10.192.130.160 0.0.0.31 host 10.81.39.180
access-list 160 permit ip 10.192.130.160 0.0.0.31 host 10.81.39.182
access-list 160 permit ip 10.192.130.160 0.0.0.31 host 10.81.39.181
route-map mail-web permit 10
  match ip address 160
  set ip next-hop 10.192.130.196

and the interface to which you apply this policy is:

interface Vlan15
description CON_CPD
ip address 10.192.130.138 255.255.255.248
ip policy route-map mail-web
standby 1 ip 10.192.130.137
standby 1 priority 200
standby 1 preempt
standby 1 authentication d3n1a

But eliminating the ACL160 that only affects users on vlan 260 (10.192.130.160/27), cut communication with networks of users in vlan 110: 172.22.248.0/23, 172.22.247.0/24, 172.22. 243.0/24

The sentences I've added to the ACL are:
access-list 160 permit ip 172.22.247.17 0.0.0.7 host 10.81.39.180
access-list 160 permit ip 172.22.247.17 0.0.0.7 host 10.81.39.181
access-list 160 permit ip 172.22.247.17 0.0.0.7 host 10.81.39.182

10 Replies 10

Jerry Ye
Cisco Employee
Cisco Employee

I am not sure what you are trying to add

172.22.247.17 0.0.0.7 is wrong, it should be 172.22.247.16 0.0.0.7 which cover 172.22.247.16-31.

Is that what you need?

Regards,

jerry

Sorry, my  mistake was in writing. The problem is that by removing the ACL, users of  the vlan 110 (172.22.248.0/23, 172.22.247.0/24, 172.22. 243.0/24) lose  network connection ...

thanks!

The normal behavior when removing statements in an ACL referenced by PBR is to match all packets so all traffic is routed using PBR. Your route-map sequence is to permit, and the ACL is a match criteria. When you removed the ACL, there is no match criteria anymore, so all traffic is matched. This is same behavior we would get configuring the following:

!
route-map PBR permit 10
set ip next-hop 1.1.1.1
!

The above statement matches all traffic (by design).

HTH,

jerry

The  problem is that I have seen that from another range  (10.192.130.160/27) I had network conectivity ... then, no matches all  traffic?

Without seeing your other routing configuration and topology, I can't comment on why 10.192.130.160/27 has network connectivity.

If you can supply more info, I would be happy to help.

Regards,

jerry

hello,
thanks for your  time and help, I attach the show ip route of the device.

What address are you sourcing the traffic from and what address you are trying to get to when after you'd removed the ACL?

Hi,

I am connected to the network 10.192.130.160/27, and this traffic, when the destine is 10.81.39.180-181-182 must go through 10.192.130.160 instead 10.192.130.140. When I remove the ACL I can access Internet (via 10.192.130.194)

users of the vlan 110: 172.22.247.0/24, 172.22.243.0/24, 172.22.248.0/24  when I delete the ACL, they can not go outside (internet browsing) pej: 10.192.130.194

I think that this behavior does not make sense?

regards!

This is want I am seeing based on your routing table and assuming there is only one PBR configured.

When the ACL doesn't exist, traffic from 10.192.130.160/27 going to 10.81.39.180-181-182

10.192.130.160 ->10.192.130.136(Vlan15) -> 10.192.130.196 ->

based on

S       10.192.130.160/27 [1/0] via 10.192.130.136

route-map mail-web permit 10
  match ip address 160 <- assuming empty ACL

  set ip  next-hop 10.192.130.196

When Vlan110 going to 10.81.39.180-181-182

Vl110 ->10.192.12.137(Vlan20)

based on

S       10.81.39.0/24 [1/0] via 10.192.12.137

C       10.192.12.128/28 is directly connected, Vlan20

I am only seeing traffic going through the 6500 but not the return traffic, which I cannot determine if there are any asymmetric route issue.

Regards,

jerry

Hi!

I don't understand the first explanation:

When the ACL doesn't exist, traffic from 10.192.130.160/27 going to 10.81.39.180-181-182

10.192.130.160 ->10.192.130.136(Vlan15) -> 10.192.130.196 ->
based on

S       10.192.130.160/27 [1/0] via 10.192.130.136


The ACL 260 was created to prevent asymmetric routing: without the ACL, the requests do not pass through the firewall but the answers yes, that is why we created this ACL for accessing voice servers pass through the firewall.
(When ACL doesn't exist, traffic to 10.81.39.0/24 must go trough 10.192.12.137, when the ACL exist and the traffic matches this ACL, the next-hop change to 10.192.130.196)

Now we needed to include another range of IPs that also access the voice server, this new range is in 172.20.247.x, and was when adding new lines that this new IPs could not access the voice server, so eliminating the ACL, whole range of IPs vlan 110 lost Internet connection.

By eliminating the ACL160 that only affects devices from the vlan 260 (10.192.130.160/27) was cut off communication network vlan 110 but not 10.192.130.160/27 network.

Review Cisco Networking products for a $25 gift card