Unsolved

4 Posts

669

January 25th, 2021 09:00

N1524 Access Lists

Hi,

I'm not sure how to achieve the below:

I have port Gi1/0/13 which has local IP 192.168.100.1, and should be able to access the whole internet, however, it should only be accessed from 1.2.3.4 from the internet.

How would I achieve this?

My current config is like this:

ip access-list test
permit ip any 1.2.3.4 0.0.0.0
deny every
exit
....
interface Gi1/0/13
spanning-tree portfast
switchport access vlan 3
ip access-group test in 1
exit

It, however, seems to only be able to receive incoming traffic this way.

Any help would be appreciated.

Moderator

 • 

9.5K Posts

January 25th, 2021 14:00

Hi s_dekkers,

Are you connecting this switch directly to the internet or is it going through a router? Your deny all clause will block all of the traffic that isn’t explicitly permitted, so you have to do a permit statement for all of the other traffic. Page 277 https://dell.to/3c9Mu9K

 

4 Posts

January 26th, 2021 01:00

Hi,

This switch is going through a datacenter provided gateway, so no configuration other than the configuration we can do on the switch is possible.

The idea of the access-lists is to deny any IP but 1.2.3.4 to access this interface as it hosts the idrac webinterface. It should however not block other traffic (initiated from Gi1/0/13 to the internet)

Thanks,

Moderator

 • 

790 Posts

January 26th, 2021 05:00

Hi s_dekkers,

 

I opened an internal ticket for this request, as soon as I get a reply or Josh is back online, we will contact you again.

 

BR
Stefan

Moderator

 • 

790 Posts

February 3rd, 2021 03:00

Hi s_dekkers.

 

I received some assist on the case, here is what I'd like you to check.

 

Looking at the current config,


ip access-list test
permit ip any 1.2.3.4 0.0.0.0
deny every
exit

 

Syntax(ACL)

[sequence-number]{deny | permit} {ipv4-protocol | 0-255 | every} {srcip srcmask | any | host srcip} [{range {portkey | startport} {portkey | endport}} | {eq | neq | lt | gt} {portkey | 0-65535} ] {dstip dstmask | any | host dstip} [{range {portkey | startport} {portkey | endport}} | {eq | neq | lt | gt} {portkey | 0-65535}] [flag [+fin | -fin] [+syn | -syn] [+rst | -rst] [+psh | -psh] [+ack | -ack] [+urg | -urg] [established]] [icmp-type icmptype [icmp-code icmp-code] | icmp-message icmp-message] [igmp-type igmp-type] [fragments] [precedence precedence | tos tos [tosmask] | dscp dscp]}} [time-range time-range-name] [log] [assign-queue queue-id] [{mirror | redirect} interface-id] [rate-limit rate burst-size

 

Based on the syntax above it should be:

 

permit ip 1.2.3.4 0.0.0.0 any (source ip followed by destination) as you require it from the particular host 1.2.3.4)


For the outbound ACL:


permit ip (src IP -could be the IP of the Gi1/0/13 interface- 192.168.100.1 or any) any any 


Please provide the outputs of  'show ip access-lists test' before and after making this change. 

 

BR
Stefan

0 events found

No Events found!

Top