- Community Home
- >
- Networking
- >
- Switching and Routing
- >
- HPE Aruba Networking & ProVision-based
- >
- Re: 5412zl multiple VLAN's need ACL
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-04-2014 09:01 AM
06-04-2014 09:01 AM
5412zl multiple VLAN's need ACL
I received my 5412zl and have been reading on getting ready to configure it. I'm running into a design problem though (well not really a problem.. wanting more guidance).
Basically I have about 20 VLANs. None of the VLAN's should talk to each other except for a couple exeptions:
- All VLANs should be able to talk to 10.1.0.80 on port 80 & 443 which is located in VLAN 10
- None of the VLANs should be able to talk to each other
From what I read for performance reasons it is best to apply the access-list inbound instead of outbound for performance reasons.
So for something like this do I create an extended access list that denies all the VLAN's and permit the ones I want at the bottom?
What I was hoping ot be able to do to just make it easier is make an extended access lists where I just put in my PERMITs and it has an implicit DENY at the end. This seems to work except for internet access. I've tried telling it to allow the firewall IPbut doesn't seem to work.
Long story short is there a way to create an access list where I just put my PERMITs in and apply it to the inbound for a VLAN? The VLAN's all need interenet access though
- Tags:
- ACLs
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-04-2014 02:15 PM
06-04-2014 02:15 PM
Re: 5412zl multiple VLAN's need ACL
ACLs on that unit do have an implicit deny at the end so it could be as simple as adding statements for what you explicitly want to permit then applying that ACL inbound on the VLANs in question. For internet access you need statements for DNS and HTTP/HTTPs trafic along with statements allowing access to your internal systems.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-06-2014 04:20 PM - edited 06-06-2014 04:21 PM
06-06-2014 04:20 PM - edited 06-06-2014 04:21 PM
Re: 5412zl multiple VLAN's need ACL
The problem is I basically want to deny all the VLAN's but allow out to the internet (anywhere on internet).
I could end up having 100 VLAN's so I want thinking it would be easier to just put in what I wanted to allow instead of having to write deny's over 100 times and then a permit any any at the end.
I guess this what I'm trying to do (inbound ACL applied to VLAN 505):
Allow VLAN 5
Allow IP 10.10.10.10 on VLAN 10
Allow to Internet
(implicit deny)
This is what I'm doing and it works.. just more I have to do:
Deny VLAN 2
Deny VLAN 3
Deny VLAN 4
Deny VLAN 6
....
..
..
Permit any any