- Community Home
- >
- Networking
- >
- Legacy
- >
- Switches, Hubs, Modems
- >
- 5406ZL ACLs
Switches, Hubs, and Modems
1747980
Members
3938
Online
108756
Solutions
Forums
Categories
Company
Local Language
юдл
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Forums
Discussions
юдл
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Go to solution
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО03-30-2009 07:04 AM
тАО03-30-2009 07:04 AM
Dear all,
I'm trying to get an ACL working on my 5406ZL but am experiencing some odd behaviour; any help would be much appreciated.
I run a VLAN full of devices (VOIP phones) that need to obtain IP addresses from outside the VLAN via DHCP and need to be accessible via http so that users can maintain speed dial numbers etc. All other traffic should be blocked (legitimate VOIP traffic originates from within the VLAN).
The VLAN is working as it should, but I can't get the ACL to work properly. It currently looks like:
Access Control Lists
Name: 100
Type: Extended
Applied: Yes
SEQ Entry
-----------------------------------------------------------------------------
5 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s): eq 80
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Proto : TCP
TOS : - Precedence: -
25 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s): eq 68
Proto : UDP
TOS : - Precedence: -
55 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s): eq 67
Proto : UDP
TOS : - Precedence: -
This blocks all traffic except on port 80, which is great. However, when I try to load the web interface of one of the phones I get a "The connection was refused when attempting to contact 192.168.102.20." error. If I refresh the browser, it loads the page without any trouble.
I thought the problem could be a lack of a rule for established connections, as here:
http://forums11.itrc.hp.com/service/forums/questionanswer.do?threadId=991602
So I added a final line to my ACL:
65 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Proto : TCP (Established)
TOS : - Precedence: -
I still suffer the same behaviour, however. I'd be very grateful to anyone who could help me load these web interfaces on the first request!
Cheers, Joseph
I'm trying to get an ACL working on my 5406ZL but am experiencing some odd behaviour; any help would be much appreciated.
I run a VLAN full of devices (VOIP phones) that need to obtain IP addresses from outside the VLAN via DHCP and need to be accessible via http so that users can maintain speed dial numbers etc. All other traffic should be blocked (legitimate VOIP traffic originates from within the VLAN).
The VLAN is working as it should, but I can't get the ACL to work properly. It currently looks like:
Access Control Lists
Name: 100
Type: Extended
Applied: Yes
SEQ Entry
-----------------------------------------------------------------------------
5 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s): eq 80
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Proto : TCP
TOS : - Precedence: -
25 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s): eq 68
Proto : UDP
TOS : - Precedence: -
55 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s): eq 67
Proto : UDP
TOS : - Precedence: -
This blocks all traffic except on port 80, which is great. However, when I try to load the web interface of one of the phones I get a "The connection was refused when attempting to contact 192.168.102.20." error. If I refresh the browser, it loads the page without any trouble.
I thought the problem could be a lack of a rule for established connections, as here:
http://forums11.itrc.hp.com/service/forums/questionanswer.do?threadId=991602
So I added a final line to my ACL:
65 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Proto : TCP (Established)
TOS : - Precedence: -
I still suffer the same behaviour, however. I'd be very grateful to anyone who could help me load these web interfaces on the first request!
Cheers, Joseph
Solved! Go to Solution.
2 REPLIES 2
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО03-31-2009 07:01 AM
тАО03-31-2009 07:01 AM
Solution
hi joseph, those last rule makes no sense because you are premiting all the trafic so try to delete this one because with that the other ones make no effect, i├В┬┤m not an expert in acl├В┬┤s but try to use rule to premit from everywhere to the http, similar with the first one but like that:
5 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s): eq 80
Proto : TCP
TOS : - Precedence: -
Try if this work?? Because your premiting http to anywhere but not the opposite.
5 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s): eq 80
Proto : TCP
TOS : - Precedence: -
Try if this work?? Because your premiting http to anywhere but not the opposite.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-01-2009 05:12 AM
тАО04-01-2009 05:12 AM
Re: 5406ZL ACLs
Thanks nunocosta75, that worked as expected.
Of course, it has the unfortunate side affect of allowing devices in this vlan to escape it on port 80. This is possibly not *too* bad, however, and the IP range in question can't access port 80 past the firewall at least.
I'll call that one solved.
Cheers, Joseph
Of course, it has the unfortunate side affect of allowing devices in this vlan to escape it on port 80. This is possibly not *too* bad, however, and the IP range in question can't access port 80 past the firewall at least.
I'll call that one solved.
Cheers, Joseph
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
News and Events
Support
© Copyright 2024 Hewlett Packard Enterprise Development LP