cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3341
Views
5
Helpful
15
Replies

sg-300 acl vlan question

wehner
Level 1
Level 1

Hello,

I have a SG300 Switche working in layer 3 mode.

I configured 3 VLANs on the switch with different ip's

Vlan 1: 192.168.1.1

Vlan 2: 192.168,2.1

Vlan 3: 192.168.3.1

Now I want to implement ACL to permit vlan2 to have full access on vlan3 but I want to deny access from vlan3 to vlan2

Is this possible and do you have an example?

Best regards

Andreas

Sent from Cisco Technical Support iPad App

15 Replies 15

saljam100
Level 1
Level 1

Hi Andreas

have you try to place ACL in outbound direction under the VLAN3 ....... which specifically deny the traffic from vlan3 (192.168.3.1) to vlan 2 (192.168.2.1) but allow all other traffic.

hope this will work

Dont forget to rate if its useful.

Regards

Salman Jamshed

Tom Watts
VIP Alumni
VIP Alumni

Hi Andreas,

Log to the UI of the switch.

Navigate Access Control -> IPV4 Based ACL

Create the access list with the name you want.

Navigate Access Control -> IPV4 Based ACE

Select the name of your ACL then click ADD

The priority is very important. I recommend to do in increments of 10, so rule #1 priority = 10, rule #2 = 20, etc

Action is to DENY

Protocol = ANY

Source IP: 192.168.3.0 0.0.0.255

Destination IP: 192.168.2.0 0.0.0.255

Save this

Create second ACE rule,

Priority 20

Action PERMIT

Protocol = ANY

Source IP: Any

Destination: Any

Save

Lastly, you need to bind the ACL to a port.

Go to Access Control -> ACL Binding

Choose a port, edit it, choose the IPV4 ACL, apply it.

-Tom

-Tom Please mark answered for helpful posts http://blogs.cisco.com/smallbusiness/

Thanks Thomas for you answer. That is pretty much how I created the access list. My problem if I understand it correct is if I deny access from vlan3 in the vlan2 acls then I will have no access from vlan2 to vlan3 because the reply packages coming back from vlan3 will be filtered.

Thanks Salman for you answer too. What do you mean with "ACL in outbound" direction. What I understand is that the sg300 switch can only have ACL on the ingress traffic. So is there any possibility to see who started the ip conversation?

Thanks for your help

Andreas

Correct, there is not an inside or outside, the ACL is applied ingress only. The switch logging should show if traffic dropped per the ACL.

-Tom

-Tom Please mark answered for helpful posts http://blogs.cisco.com/smallbusiness/

andbor600
Level 1
Level 1

Andreas, have you found the solution ?

Hello


Option 1 (Not sure if this would deny traffic both ways if so see option 2)
-----------

Access-list 100 permit ip 192.168.3.0 0.0.0.255 any
Access-list 101 permit ip any any

Vlan-access map TST 10
Match IP address 100
Action drop

Vlan-access map TST 20
Match IP address 101
Action forward

Vlan filter-list TST 20



Option 2 ( tcp traffic initiated from vlan 2 would allow return top traffic from vlan 3)
-----------
Ip access-list extended TST
Permit tcp 192.168.3.0 0.0.0.255 any established
deny tcp 192.168.3.0 0.0.0.255 any
permit ip any any

Int vlan 2
Ip access-group TST out

Res
Paul

Sent from Cisco Technical Support iPad App



Please rate and mark as an accepted solution if you have found any of the information provided useful.
This then could assist others on these forums to find a valuable answer and broadens the community’s global network.

Kind Regards
Paul

hi Paul the commands you presented unfortunately do not apply to SG500 switches ...

do you have "the same" set of commands for SG500 series ?

hello
Whatabout option 2?

Res
Paul

Sent from Cisco Technical Support iPad App


Please rate and mark as an accepted solution if you have found any of the information provided useful.
This then could assist others on these forums to find a valuable answer and broadens the community’s global network.

Kind Regards
Paul

what is "option 2" ?

Hello

Option 2 ( tcp traffic initiated from vlan 2 would allow return top traffic from vlan 3)
-----------
Ip access-list extended TST
Permit tcp 192.168.3.0 0.0.0.255 any established
deny tcp 192.168.3.0 0.0.0.255 any
permit ip any any

Int vlan 2
Ip access-group TST out



Sent from Cisco Technical Support iPad App


Please rate and mark as an accepted solution if you have found any of the information provided useful.
This then could assist others on these forums to find a valuable answer and broadens the community’s global network.

Kind Regards
Paul

hi there, my misunderstanding.

both options do not work.

there is no command "ip access-group X out" for an interface

Hum, okay try this

Ip access-list extended TST

Permit tcp  192.168.3.0 0.0.0.255 any established

deny tcp 192.168.3.0 0.0.0.255 any

permit ip any any

int vlan 3

service-acl input TST

Please don't forget to rate any posts that have been helpful.

Thanks.


Please rate and mark as an accepted solution if you have found any of the information provided useful.
This then could assist others on these forums to find a valuable answer and broadens the community’s global network.

Kind Regards
Paul

no luck.

SG500 does not recognize anything like "service-acl"

below set of availabe commands:

SG500(config-if)#service-acl

% Unrecognized command

SG500(config-if)#

  bridge               Bridge configuration commands

  do                   execute an EXEC-level command

  dot1x                dot1x protocol

  end                  Exit from configure mode

  exit                 Exit from current context

  help                 Description of the interactive help system

  ip                   Global IP configuration commands

  ipv6                 IPv6 commands

  name                 set vlan name

  no                   Negate command

  sntp                 Global Simple Network Time Protocol (SNTP)

                       configuration subcommands

SG500(config-if)#ip

  address              Set the IP address of an interface

  dhcp                 Configure DHCP services

  igmp                 Configure igmp interface.

  proxy-arp            Enable proxy ARP on interface

SG500(config-if)#do

  boot                 Boot Commands

  clear                Reset functions

  clock                Manage the system clock

  configure            Enter configuration mode

  copy                 Copy from one file to another

  crypto               Cryptographic commands

  debug-mode           Exit from the EXEC to debug mode

  delete               Delete a file from the flash file system

  dir                  Display the list of files on the flash file system

  disable              Disable privileged commands

  dot1x                802.1x EXEC commands

  exit                 Exit from the EXEC

  green-ethernet       Green ethernet commands

  help                 Description of the interactive help system

  ip                   Global IP configuration commands

  login                Exit from the EXEC and Log in

  macro                Ports macros

  menu                 Enter into Menu-CLI

  more                 Display a file

  no                   Negate command

  ping                 Send echo messages.

  reload               Halt and perform a cold restart

  rename               Rename a file

SG500(config-if)#

hello

i dont have access ti cco documentation to check the ios commands for this switch

can you create the acl if so you must be able to apply it to an interface

res
paul



Sent from Cisco Technical Support Android App


Please rate and mark as an accepted solution if you have found any of the information provided useful.
This then could assist others on these forums to find a valuable answer and broadens the community’s global network.

Kind Regards
Paul
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card