Switches, Hubs, and Modems
cancel
Showing results for 
Search instead for 
Did you mean: 

5406ZL ACLs

SOLVED
Go to solution
Joseph_Reeves
Occasional Visitor

5406ZL ACLs

Dear all,

I'm trying to get an ACL working on my 5406ZL but am experiencing some odd behaviour; any help would be much appreciated.

I run a VLAN full of devices (VOIP phones) that need to obtain IP addresses from outside the VLAN via DHCP and need to be accessible via http so that users can maintain speed dial numbers etc. All other traffic should be blocked (legitimate VOIP traffic originates from within the VLAN).

The VLAN is working as it should, but I can't get the ACL to work properly. It currently looks like:

Access Control Lists

Name: 100
Type: Extended
Applied: Yes

SEQ Entry
-----------------------------------------------------------------------------
5 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s): eq 80
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Proto : TCP
TOS : - Precedence: -

25 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s): eq 68
Proto : UDP
TOS : - Precedence: -

55 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s): eq 67
Proto : UDP
TOS : - Precedence: -

This blocks all traffic except on port 80, which is great. However, when I try to load the web interface of one of the phones I get a "The connection was refused when attempting to contact 192.168.102.20." error. If I refresh the browser, it loads the page without any trouble.

I thought the problem could be a lack of a rule for established connections, as here:

http://forums11.itrc.hp.com/service/forums/questionanswer.do?threadId=991602

So I added a final line to my ACL:

65 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Proto : TCP (Established)
TOS : - Precedence: -

I still suffer the same behaviour, however. I'd be very grateful to anyone who could help me load these web interfaces on the first request!

Cheers, Joseph
2 REPLIES
nunocosta75
Advisor
Solution

Re: 5406ZL ACLs

hi joseph, those last rule makes no sense because you are premiting all the trafic so try to delete this one because with that the other ones make no effect, i´m not an expert in acl´s but try to use rule to premit from everywhere to the http, similar with the first one but like that:

5 Action: permit
Src IP: 0.0.0.0 Mask: 255.255.255.255 Port(s):
Dst IP: 0.0.0.0 Mask: 255.255.255.255 Port(s): eq 80
Proto : TCP
TOS : - Precedence: -

Try if this work?? Because your premiting http to anywhere but not the opposite.
Joseph_Reeves
Occasional Visitor

Re: 5406ZL ACLs

Thanks nunocosta75, that worked as expected.

Of course, it has the unfortunate side affect of allowing devices in this vlan to escape it on port 80. This is possibly not *too* bad, however, and the IP range in question can't access port 80 past the firewall at least.

I'll call that one solved.

Cheers, Joseph