Hi!
I'm trying to separate users from servers. For servers I use 10.10.0.0/24 net. For management 10.10.x.0/24 net. For User traff I use 10.x.x.0/24 net's.
OS6850 is routing user traff to DG 10.10.0.2 How to close access to 10.10.0.0/24 (exept 10.10.0.2) and to 10.10.x.0/24 ???
Thanks!
ACL to separate networks
-
telephonist
Re: ACL to separate networks
Still trying to create this ACL. Completely in dead end. Please help!
-
usmanikf
Re: ACL to separate networks
create policy;
>policy network group srvfarm 10.10.0.0 mask 255.255.255.0
>policy network group manage 10.10.X.0 mask 255.255.255.0
>policy condition c1 source network group srvfarm destination network group manage
>policy action a1 disposition drop
>policy rule r1 condition c1 action a1
>qos apply
>policy network group srvfarm 10.10.0.0 mask 255.255.255.0
>policy network group manage 10.10.X.0 mask 255.255.255.0
>policy condition c1 source network group srvfarm destination network group manage
>policy action a1 disposition drop
>policy rule r1 condition c1 action a1
>qos apply
-
one6f
Re: ACL to separate networks
Hi telephoist,
if this still relevant today here is some suggestions.
To separate Users we can join Server and Management together in network group srv_mgmt 10.10.0.0 mask 255.255.0.0
I did not quite understand where the gateway for Users (10.10.0.2? ,because this is a Server subnet), but it didn't matter, you can still change this config according your requirements.
Option 1.You can also use this network group for Users(and extend accordingly):
Option 2.
Instead of blocking Users you can block Any and use established connections for Server and Management:
I think this should work.
if this still relevant today here is some suggestions.
To separate Users we can join Server and Management together in network group srv_mgmt 10.10.0.0 mask 255.255.0.0
I did not quite understand where the gateway for Users (10.10.0.2? ,because this is a Server subnet), but it didn't matter, you can still change this config according your requirements.
Option 1.
Code: Select all
qos enable
policy network group gw 10.10.0.2
policy network group srv_mgmt 10.10.0.0 mask 255.255.0.0
policy network group users 10.1.0.0 mask 255.255.255.0 10.1.1.0 mask 255.255.255.0 10.1.2.0 mask 255.255.255.0
policy condition gw_users source network group gw destination network group users
policy condition srv_mgmt_users source network group srv_mgmt destination network group users
policy condition users_gw source network group users destination network group gw
policy condition users_srv_mgmt source network group users destination network group srv_mgmt
policy action allow
policy action deny disposition deny
policy rule users_gw precedence 160 condition users_gw action allow
policy rule gw_users precedence 150 condition gw_users action allow
policy rule users_srv_mgmt precedence 140 condition users_srv_mgmt action deny
policy rule srv_mgmt_users precedence 130 condition srv_mgmt_users action deny
qos applyCode: Select all
policy network group users 10.1.0.0 mask 255.255.0.0 10.2.0.0 mask 255.255.0.0 10.3.0.0 mask 255.255.0.0Instead of blocking Users you can block Any and use established connections for Server and Management:
Code: Select all
policy network group allow_gw 10.10.0.2
policy network group srv_mgmt 10.10.0.0 mask 255.255.0.0
policy condition allow_gw_any source network group allow_gw destination ip Any
policy condition any_allow_gw source ip Any destination network group allow_gw
policy condition any_srv_mgmt source ip Any destination network group srv_mgmt
policy condition any_srv_mgmt_est source ip Any destination network group srv_mgmt established
policy condition srv_mgmt_any source network group srv_mgmt destination ip Any
policy action allow
policy action deny disposition deny
policy rule any_allow_gw precedence 160 condition any_allow_gw action allow
policy rule allow_gw_any precedence 150 condition allow_gw_any action allow
policy rule srv_mgmt_any precedence 140 condition srv_mgmt_any action allow
policy rule any_srv_mgmt_est precedence 130 condition any_srv_mgmt_est action allow
policy rule any_srv_mgmt precedence 120 condition any_srv_mgmt action deny
qos apply
You do not have the required permissions to view the files attached to this post.
-
telephonist
Re: ACL to separate networks
Hi,
I did some redesign of my IP distribution. I've moved all O&M to 172.20.0.0/16 so now the task is just to separate USERS 10.10.x.x from 172.20.0.0/16
Can I do it like
Actually all users are on some ports 1/1, 1/2 etc.. Can I block source not IP but PORTs ?
Thanks!
I did some redesign of my IP distribution. I've moved all O&M to 172.20.0.0/16 so now the task is just to separate USERS 10.10.x.x from 172.20.0.0/16
Can I do it like
Code: Select all
create policy
policy network group manage 172.20.0.0 mask 255.255.0.0
policy network group users 10.10.0.0 mask 255.255.0.0
policy condition c1 source network group users destination network group manage
policy action a1 disposition drop
policy rule r1 condition c1 action a1
qos apply
Thanks!
-
one6f
Re: ACL to separate networks
Hi,
it will drop ip traffic from 10.10.0.0/16 to 172.20.0.0/16, but not reverse.There is a possibility to create a port group called UserPorts and add the ports to that group. Note that the UserPorts group applies to both bridged and routed traffic, and it is not necessary to include the UserPorts group in a condition and/or rule for the group to take effect. For more information, please refer to the relevant Network Configuration Guide.
it will drop ip traffic from 10.10.0.0/16 to 172.20.0.0/16, but not reverse.
Yes, for example:Actually all users are on some ports 1/1, 1/2 etc.. Can I block source not IP but PORTs ?
Code: Select all
-> policy port group pgroup1 3/1-2 4/3 5/4
-> policy condition c2 source port group pgroup1
In this example, a Layer 2 condition (c2) specifies that traffic matches the ports included of the pgroup1 port group. The condition also specifies that the port group is a source group. Any traffic coming in on ports 1 or 2 on slot 3, port 3 on slot 4, or port 4 on slot 5 matches condition c2.