Unsolved
This post is more than 5 years old
20 Posts
0
39888
March 9th, 2006 19:00
using ACL's to block VLAN's
I've read through some of the DELL documentation and its kinda helped, but I just want a general overview to get me started on this.
I have two VLANS setup 1 & 2, and probably dont want them to communicate. Not sure if they do by default or not. On VLAN 2, I was thinking just to give them port 80 and 443 for example, but not be able to ping my 10.0.0.1 subnet or gain access to our machines. For security reasons. Basically if this new branch on our subnet gets infected with a virus or something, I want them segmented so they dont infect our default subnet (10.0.0.1)
Can I get an ACL example of how this would be done.
Message Edited by jbilliau on 03-09-2006 03:39 PM
0 events found
No Events found!


DELL-Cuong N.
1K Posts
0
March 9th, 2006 19:00
Hi again jbilliau :-).
You should qualify this by saying that you are working on the 6024 correct? By default VLAN do not communicate at layer 2 meaning that an L2 switch will not forward packets from one VLAN to another. However since you are using a 6024 (L3 router) and you setup routes, the 6024 will route between the VLANs so you are no longer blocked from communicating between two VLANs.
To make sure that host on one VLAN can access only specific system or specific ports on these systems on another VLAN you need to setup ACLs. As you mentioned there are a number of papers online that explain how ACL works on Dell support site.
What I would suggest is this - try setting up the ACL based on the example that are shown in those papers. Then post what you tried here and explain your difficulties and we'll be able to help you figure out the solution. This will help you understand why something work or not work and will help you in the long run since you have to maintain these switches after all :-).
Cuong.
DELL-Cuong N.
1K Posts
0
March 10th, 2006 13:00
ACL are applied in order so if the first rule already fit then nothing else will be tried. There is an implicit deny at the end of the set of rules so if you define a set of "permit" rule and nothing else then if none of the permit rule succeed then the implicit deny will take affect.
Here is the section of documents on 6024 that talks about ACL CLI commands:
<ADMIN NOTE: Broken link has been removed from this post by Dell>
Cuong.
jbilliau
20 Posts
0
March 10th, 2006 13:00
Yes the 6024. I've just never worked with ACL's much so I wanted help with priority really. Would I create all my permit statements first (i.e port 80, 443, etc) then put a deny at the end? Because I put a deny first, then made a permit acl for port 80, but web browsing never worked. Im guessing because that first ACL it never got passed.
Id also like to know if there's documentation on commands? For example Im trying to unbind an ACL from an interface, but can only do it through the web interface. If I try "no service-acl input vlan_2" it doesnt work. I always thought "no" in front of commands took them off
jbilliau
20 Posts
0
March 10th, 2006 14:00
Message Edited by jbilliau on 03-10-2006 11:23 AM
DELL-Cuong N.
1K Posts
0
March 10th, 2006 14:00
permit-tcp { any | source source-wildcard}} { any | source-port} { any | destination destination-wildcard}} { any | destination-port} [dscp dscp number | ip-precedence ip-precedence]
jbilliau
20 Posts
0
March 10th, 2006 14:00
Message Edited by jbilliau on 03-10-2006 10:26 AM
DELL-Cuong N.
1K Posts
0
March 10th, 2006 16:00
Please look at the 6024 documentation which will give you the correct syntax. Also when using the CLI if you put "permit-tcp ?" you will get online help that tell you what parameters you are missing. Please review that information.
Here is the command from the 6024 documentation:
permit-tcp {any | source source-wildcard } {any | source-port} {any | destination destination-wildcard } {any | destination-port} [dscp dscp-number | ip-precedence ip-precedence]
jbilliau
20 Posts
0
March 10th, 2006 17:00
Ok I really dont get ACL's then. Ive been going over documentation for hours now trying about every combination with no success. All Im trying to do is give VLAN2 (10.0.1.0) access to port 80 (web browsing)
I even tried something simple like:
permit-tcp any any 10.0.0.0 0.0.0.255 80
with no success
10.0.0.1 is our gateway, so Im trying to only make the destination that address rather than ANY. Is my thinking off here Cuong?
DELL-Cuong N.
1K Posts
0
March 10th, 2006 18:00
jbilliau
20 Posts
0
August 1st, 2006 14:00