Hi Parnassus,
Thanks a lot for picking out. You are correct about /26, the wildcard mask should be 0.0.0.63. Also, I took out ACE of "deny any any any" as you explained it will deny apart from "Allow" ACEs.
So I have updated ACL to:
access-list ip VLAN_ACL_150
vsx-sync
!
10 permit udp 10.8.2.0 0.0.0.255 any eq 67 log count
15 permit tcp 10.8.2.0 0.0.0.255 any eq 53 log count
20 permit udp 10.8.2.0 0.0.0.255 any eq 53 log count
30 permit any 10.8.103.0 0.0.0.63 any log count
40 permit tcp any any eq 80 log count
50 permit tcp any any eq 443 log count
Now my questions are:
1. would this ACL allow the DNS and DHCP service from our domains servers in 10.8.2.0 range? Is this even correct: "10 permit udp 10.8.2.0 0.0.0.255 any eq 67 log count"? or Can I use "10 permit dns 10.8.2.0 0.0.0.255 any log count"?
2. VLAN 150 is the guest network range, don't want any devices from this scope to reach our production range (server vlan, building vlans, and 802.1x range) apart from getting IP, DNS services and Clearpass authentications. Should I apply ACL to VLAN as out?
Thanks
ML
------------------------------
Becoming a Networking Engineer
------------------------------
Original Message:
Sent: Jun 27, 2022 06:43 AM
From: Davide Poletto
Subject: ACL for guest network VLAN and ACL's protocol number
Hi, if I were you I would apply that ACL "VLAN_150_Out" (and if I were you I will name it as "VLAN-150" too or something like that...just to have a reference about VLAN id 150 only) on the incoming direction (the point of view is: incoming into the SVI, as seen by VLAN 150) not on outgoing direction as you wrote.
Note that the wildcard for the 10.8.103.0/26 network is 0.0.0.63 so the ACE:
30 permit any any 10.8.103.0 0.0.0.255 log count
would become:
30 permit any any 10.8.103.0 0.0.0.63 log count
but the point is that the ACL already has an implicit (hidden) Deny any/any at its very end so your ACE 1001 seems not so useful and, generally, the ACL structure would be made of: some ACEs of Permit -> some ACEs of Deny -> an explicit ACE of Permit Any/Any (which will only pass on what wasn't explicitly denied before thanks to any previous - matching first - Permit ACEs eventually present) and then, finally, the (implicit) Deny Any/Any ACE. So probably you should rework it a little bit to fit your needs.