Switches, Hubs, and Modems
1747980 Members
3938 Online
108756 Solutions
New Discussion юеВ

5406ZL ACLs

 
SOLVED
Go to solution
Joseph_Reeves
New Member

5406ZL ACLs

Dear all,

I'm trying to get an ACL working on my 5406ZL but am experiencing some odd behaviour; any help would be much appreciated.

I run a VLAN full of devices (VOIP phones) that need to obtain IP addresses from outside the VLAN via DHCP and need to be accessible via http so that users can maintain speed dial numbers etc. All other traffic should be blocked (legitimate VOIP traffic originates from within the VLAN).

The VLAN is working as it should, but I can't get the ACL to work properly. It currently looks like:

Access Control Lists

Name: 100
Type: Extended
Applied: Yes

SEQ Entry
-----------------------------------------------------------------------------
5 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s): eq 80
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Proto : TCP
TOS : - Precedence: -

25 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s): eq 68
Proto : UDP
TOS : - Precedence: -

55 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s): eq 67
Proto : UDP
TOS : - Precedence: -

This blocks all traffic except on port 80, which is great. However, when I try to load the web interface of one of the phones I get a "The connection was refused when attempting to contact 192.168.102.20." error. If I refresh the browser, it loads the page without any trouble.

I thought the problem could be a lack of a rule for established connections, as here:

http://forums11.itrc.hp.com/service/forums/questionanswer.do?threadId=991602

So I added a final line to my ACL:

65 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Proto : TCP (Established)
TOS : - Precedence: -

I still suffer the same behaviour, however. I'd be very grateful to anyone who could help me load these web interfaces on the first request!

Cheers, Joseph
2 REPLIES 2
nunocosta75
Advisor
Solution

Re: 5406ZL ACLs

hi joseph, those last rule makes no sense because you are premiting all the trafic so try to delete this one because with that the other ones make no effect, i├В┬┤m not an expert in acl├В┬┤s but try to use rule to premit from everywhere to the http, similar with the first one but like that:

5 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s): eq 80
Proto : TCP
TOS : - Precedence: -

Try if this work?? Because your premiting http to anywhere but not the opposite.
Joseph_Reeves
New Member

Re: 5406ZL ACLs

Thanks nunocosta75, that worked as expected.

Of course, it has the unfortunate side affect of allowing devices in this vlan to escape it on port 80. This is possibly not *too* bad, however, and the IP range in question can't access port 80 past the firewall at least.

I'll call that one solved.

Cheers, Joseph