Solved

VLAN access-lists in HSRP based core-switches

Posted on 2013-02-07
4
1,225 Views
Last Modified: 2013-02-27
HI ,

My scenario is as follows:

a) We have two cisco-4506E switches and HSRP configured between them
b) HSRP configured for both VLAN 120 and VLAN 140 in both core-switches
c) VLAN 120 and VLAN 140 are in both core-switches
d) For VLAN 120, Core-A is Master and Cored-B is standby
e) For VLAN 140, Core-B is Master and Core-A is Standby
f) IP routing is enabled

Requirement :
1) I would like to configure access-lists
2) VLAN 120 users should get ping response from VLAN 140 users and vice versa
3) Remaining services / ports should be blocked

Inputs :
VLAN 120 Network : 192.168.120/24
VLAN 140 Network : 192.168.140.0/24


I have configured  & applied to  VLANs as below in both core-A and Core B switches simillarly
................................................................................
access-list 120 permit icmp 192.168.120.0 0.0.0.255 192.168.140.0 0.0.0.255
access-list 120 deny any any

interface vlan 120
ip access-group 120 in
.................................................................................

access-list 140 permit icmp 192.168.140.0 0.0.0.255 192.168.120.0 0.0.0.255
access-list 140 deny any any

interface vlan 140
ip access-group 140 in

.....................................................................................


Questions :

a)with the above configuration , can i get the Ping response from both side simultaneously

b) What willl happen if i say " ip access-group vlan 120 out and ip access-group vlan 140 out"

c) what is difference between in and out commands

Pls clarify
0
Comment
Question by:RAMU CH
  • 2
  • 2
4 Comments
 
LVL 50

Expert Comment

by:Don Johnston
ID: 38863920
a) Yes
b) No traffic will be allowed.
c) The direction the ACL is applied. Meaning, which traffic is being tested. With "in", only traffic entering the VLAN interface is checked against the ACL. So in the case of "ip access-group 120 in" on the VLAN 120 interface, traffic leaving VLAN 120 (and entering the VLAN 120 interface) will be checked against ACL 120.  If it were applied outbound, then traffic leaving the VLAN 120 interface going towards VLAN 120 would be checked.
0
 
LVL 1

Author Comment

by:RAMU CH
ID: 38866993
Thanks for the reply..

Means , if "in" applies , then source IP address should be other vlan network range ?

For VLAN 120 Network , is the access-list should be as follows

access-list 120 permit icmp 192.168.140.0 0.0.0.255 192.168.120.0 0.0.0.255
access-list 120 deny any any


interface vlan 120
ip access-group 120 in

Regards
Ram
0
 
LVL 50

Accepted Solution

by:
Don Johnston earned 500 total points
ID: 38868971
No. The direction is relative to the interface.

Think of yourself as the routing engine. You have "interfaces" that connect to various networks (i.e. your VLAN 120 interface connects to the 192.168.120.0 network).

Traffic coming from the 192.168.120.0 network will be coming IN your VLAN 120 interface. Traffic that you send to the 192.168.120.0 network will be going OUT your VLAN 120 interface.

Does that make sense?
0
 
LVL 1

Author Closing Comment

by:RAMU CH
ID: 38933578
Tks
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Netgear switch to Cisco switch VLAN not passing traffic 8 32
3Com 5500G-EI 3CR17254-91 dual-purposed ports 2 72
The purpose of Root Bridge 7 41
Network Config 9 71
Managing 24/7 IT Operations is a hands-on job and indeed a difficult one. Over the years I have found some simple tips and techniques to increase the efficiency of the overall operations. The core concept has always been on continuous improvement; a…
David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

929 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now