ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Dell N2048 Switch and IP ACL - I just killed part of my network...

    Scheduled Pinned Locked Moved IT Discussion
    44 Posts 5 Posters 3.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • dafyreD
      dafyre @Jimmy9008
      last edited by

      @Jimmy9008 said in Dell N2048 Switch and IP ACL - I just killed part of my network...:

      @dafyre said in Dell N2048 Switch and IP ACL - I just killed part of my network...:

      @Jimmy9008 said in Dell N2048 Switch and IP ACL - I just killed part of my network...:

      @Jimmy9008 said in Dell N2048 Switch and IP ACL - I just killed part of my network...:

      @EddieJennings

      @EddieJennings said in Dell N2048 Switch and IP ACL - I just killed part of my network...:

      @Jimmy9008 said in Dell N2048 Switch and IP ACL - I just killed part of my network...:

      So, select host only, and use the machine FQDNs?

      And you'll probably have to change the wildcard mask to match all parts of the IP of the host.

      Can ip be used with host selected, but mask left empty you think?

      With host selected, wild card is defaulted to 0.0.0.0 and disabled. So cannot edit that anyway with host selected.

      That's probably the option you are looking for then.

      *puts on a dang helmet and hides under desk.*

      Ready when you are!

      Have to move some critical VMs off of that interface before trying again first.
      With the N2048's, does deny take precedence over allow?

      For example, can I deny range 192.168.2.60 - 80 first. Then next following rule allow 192.168.2.69 only? Or would deny stick?

      That I'm not sure about.

      IIRC, on Cisco and HP devices, it's allow and then deny. It's been a while since I've had to test that theory though, so don't quote me on it.

      1 Reply Last reply Reply Quote 0
      • EddieJenningsE
        EddieJennings
        last edited by

        I thought it was the order of the ACLs (at least on Cisco stuff). Once there is a match, everything else is ignored.

        dafyreD 1 Reply Last reply Reply Quote 1
        • dafyreD
          dafyre @EddieJennings
          last edited by

          @EddieJennings said in Dell N2048 Switch and IP ACL - I just killed part of my network...:

          I thought it was the order of the ACLs (at least on Cisco stuff). Once there is a match, everything else is ignored.

          I think you may well be right. But like I said above -- it has been a while for me.

          Best I can tell @Jimmy9008 is to try it and let us know what happens, ha ha ha.

          J 1 Reply Last reply Reply Quote 1
          • J
            Jimmy9008
            last edited by

            Once the critical VMs are moved, I shall have a play and see.

            1 Reply Last reply Reply Quote 0
            • J
              Jimmy9008 @dafyre
              last edited by

              @dafyre

              @dafyre said in Dell N2048 Switch and IP ACL - I just killed part of my network...:

              @EddieJennings said in Dell N2048 Switch and IP ACL - I just killed part of my network...:

              I thought it was the order of the ACLs (at least on Cisco stuff). Once there is a match, everything else is ignored.

              I think you may well be right. But like I said above -- it has been a while for me.

              Best I can tell @Jimmy9008 is to try it and let us know what happens, ha ha ha.

              😉

              1 Reply Last reply Reply Quote 0
              • J
                Jimmy9008
                last edited by

                So... VMs moved. Rule applied based only on host.... and 3... 2... 1... still brought down everything trying to connect to anything on te1... current rule:

                0_1498745208802_N2048-2.PNG

                Ideas? Must be missing something obvious. Or is the dell firmware buggered!

                EddieJenningsE 1 Reply Last reply Reply Quote 0
                • EddieJenningsE
                  EddieJennings @Jimmy9008
                  last edited by

                  @Jimmy9008 Why not turn on logging, and see if that shows you what's matching the rule.

                  J 1 Reply Last reply Reply Quote 1
                  • J
                    Jimmy9008 @EddieJennings
                    last edited by

                    @EddieJennings said in Dell N2048 Switch and IP ACL - I just killed part of my network...:

                    @Jimmy9008 Why not turn on logging, and see if that shows you what's matching the rule.

                    Logging is enabled now. But, no logs are being generated showing the dropped traffic.

                    dafyreD 1 Reply Last reply Reply Quote 0
                    • dafyreD
                      dafyre @Jimmy9008
                      last edited by

                      @Jimmy9008 Is the traffic still being dropped?

                      J 1 Reply Last reply Reply Quote 0
                      • J
                        Jimmy9008 @dafyre
                        last edited by

                        @dafyre said in Dell N2048 Switch and IP ACL - I just killed part of my network...:

                        @Jimmy9008 Is the traffic still being dropped?

                        Yep. Sadly. Should be a simple rule. Think host has to be fqdn?

                        dafyreD 1 Reply Last reply Reply Quote 0
                        • dafyreD
                          dafyre
                          last edited by

                          You should have both source AND destination set to host.

                          J 1 Reply Last reply Reply Quote 0
                          • dafyreD
                            dafyre @Jimmy9008
                            last edited by

                            @Jimmy9008 said in Dell N2048 Switch and IP ACL - I just killed part of my network...:

                            @dafyre said in Dell N2048 Switch and IP ACL - I just killed part of my network...:

                            @Jimmy9008 Is the traffic still being dropped?

                            Yep. Sadly. Should be a simple rule. Think host has to be fqdn?

                            I doubt it. At this level, things only care about ip addresses most likely.

                            1 Reply Last reply Reply Quote 1
                            • J
                              Jimmy9008 @dafyre
                              last edited by

                              @dafyre

                              @dafyre said in Dell N2048 Switch and IP ACL - I just killed part of my network...:

                              You should have both source AND destination set to host.

                              They are. Both source and destination are set to host.

                              1 Reply Last reply Reply Quote 0
                              • EddieJenningsE
                                EddieJennings
                                last edited by

                                Did you turn on logging? Did it show anything? Sometimes how something is logged can give a clue as to how it's matching a rule.

                                1 Reply Last reply Reply Quote 0
                                • dafyreD
                                  dafyre
                                  last edited by dafyre

                                  And it's still blocking traffic to the entire subnet?

                                  Try removing and re-adding the rule to the interface?

                                  1 Reply Last reply Reply Quote 0
                                  • J
                                    Jimmy9008
                                    last edited by

                                    ... I've at least got it working. Its just, not ideal, I will contact Dell as it doesn't sound correct.

                                    So, turns out from the testing I've done, that once an ACL is applied to an interface, all traffic to that interface will drop. Even if no drop rules are added. Its all = deny as soon as ACL is added to te1.

                                    You have to specifically add a rule to allow something through. I have added IP for another machine on the LAN 2.x to be allowed to 2.41, and that one machine can contact 2.41.

                                    The server 2.117 cannot, which is correct. But I cant imagine adding everything that needs access is manageable or maintainable...

                                    DashrenderD EddieJenningsE scottalanmillerS 3 Replies Last reply Reply Quote 0
                                    • DashrenderD
                                      Dashrender @Jimmy9008
                                      last edited by

                                      @Jimmy9008 said in Dell N2048 Switch and IP ACL - I just killed part of my network...:

                                      ... I've at least got it working. Its just, not ideal, I will contact Dell as it doesn't sound correct.

                                      So, turns out from the testing I've done, that once an ACL is applied to an interface, all traffic to that interface will drop. Even if no drop rules are added. Its all = deny as soon as ACL is added to te1.

                                      You have to specifically add a rule to allow something through. I have added IP for another machine on the LAN 2.x to be allowed to 2.41, and that one machine can contact 2.41.

                                      The server 2.117 cannot, which is correct. But I cant imagine adding everything that needs access is manageable or maintainable...

                                      Interesting, that sounds like a good basis for security. Modern firewalls do that to. Drop all that isn't expressly allowed.
                                      Of course you can often change that.

                                      It's the blacklist vs whitelist approach.

                                      1 Reply Last reply Reply Quote 1
                                      • EddieJenningsE
                                        EddieJennings @Jimmy9008
                                        last edited by

                                        @Jimmy9008 said in Dell N2048 Switch and IP ACL - I just killed part of my network...:

                                        ... I've at least got it working. Its just, not ideal, I will contact Dell as it doesn't sound correct.

                                        So, turns out from the testing I've done, that once an ACL is applied to an interface, all traffic to that interface will drop. Even if no drop rules are added. Its all = deny as soon as ACL is added to te1.

                                        You have to specifically add a rule to allow something through. I have added IP for another machine on the LAN 2.x to be allowed to 2.41, and that one machine can contact 2.41.

                                        The server 2.117 cannot, which is correct. But I cant imagine adding everything that needs access is manageable or maintainable...

                                        Yeah. I feel like a fool for forgetting about the implicit deny. 😞
                                        If you wanted to allow the traffic except for the host in your rule, you'd have an allow all at the very end of the ACL.

                                        1 Reply Last reply Reply Quote 1
                                        • scottalanmillerS
                                          scottalanmiller @Jimmy9008
                                          last edited by

                                          @Jimmy9008 said in Dell N2048 Switch and IP ACL - I just killed part of my network...:

                                          So, turns out from the testing I've done, that once an ACL is applied to an interface, all traffic to that interface will drop. Even if no drop rules are added. Its all = deny as soon as ACL is added to te1.

                                          Seems like that should happen. If you apply an ACL and it doesn't do that, what good is the ACL?

                                          J 1 Reply Last reply Reply Quote 1
                                          • scottalanmillerS
                                            scottalanmiller
                                            last edited by

                                            What's the reason for adding firewalling in the middle of your network? Hostile hosts?

                                            J 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 1 / 3
                                            • First post
                                              Last post