Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17


ProCurve ACL

Posted on 2016-09-12
Medium Priority
Last Modified: 2016-09-19

I need to create an ACL and apply this to a VLAN.

I want this VLAN (102) to only be able to access the internet, all other traffic blocked - so will need to talk to a DNS Server and DHCP Server.

Has anyone got an example of this?
Question by:Ian Taylor
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
LVL 37

Expert Comment

ID: 41795358
if you want traffic on the VLAN to only have access to the Internet, don't use ACLs and an internal DNS server, use a VLAN without any L3 interfaces in combination with DHCP on the firewall utilising external DNS servers.
LVL 31

Expert Comment

ID: 41795385
You have excellent and very granular example here. Maybe some new popular services are missing is missing since it is very granular and should be added. :)
ip access-list extended GUEST_access_in
 remark ACL for VLAN GUEST
remark Block traffic to private networks
 deny   ip
 deny   ip
 deny   ip
 deny   ip
 deny   ip
 deny   ip
 deny   ip
 deny   ip
 deny   ip
 remark Allowed DHCP
 permit udp any any eq bootps
 remark Allowed traffic
 permit tcp any eq www
 permit tcp any eq 443
 permit tcp any eq ftp-data
 permit tcp any eq ftp
 permit tcp any eq 22
 permit tcp any eq 465
 permit tcp any eq 587
 permit tcp any eq 993
 permit tcp any eq 995
 permit udp any eq domain
 permit udp any eq ntp
 remark Allowed outside VPN
 remark VPN-> PPTP
 permit tcp any eq 1723
 permit gre any
 remark VPN-> L2TP - IPSec
 permit udp any eq isakmp
 permit udp any eq non500-isakmp
 remark VNC
 permit tcp any eq 5900
 remark Apple
 permit tcp eq 5223
 permit udp range 16384 16403
 remark Amazon
 permit tcp eq 5223
 permit tcp eq 5223
 permit tcp eq 5223
 permit tcp eq 4244
 permit tcp eq 5242
 permit tcp eq 5242
 permit tcp eq 5242
 permit tcp eq 5242
 permit tcp eq 5242
 permit tcp eq 5223
 permit tcp eq 4244
 remark Facebook
 permit tcp object-group FACEBOOK gt 1024 log
 remark Android Market
 permit tcp any eq 5228
 permit udp any eq 5228
 remark XMPP
 permit tcp any eq 5222
 remark Allowed traffic for Web Services Dynamic Discovery
 permit udp host eq 3702
 remark UPnP
 permit udp host eq 1900
 remark Viber
 permit tcp any eq 4244
 permit tcp any eq 5242
 permit udp any eq 5243
 permit udp any eq 7985
 remark ICMP traffic
 permit icmp any echo
 permit icmp any echo-reply
 remark Blocked traffic
 deny   ip any any log
It Cisco, but it i very similar (if not the same) for HP. This is example for VLAN with ip address range

But I guess for most environments
remark Block traffic to private networks
 deny   ip
 deny   ip
 deny   ip
 deny   ip
 deny   ip
 deny   ip
 deny   ip
 deny   ip
 deny   ip
 permit ip any any

would be enough.

Author Comment

by:Ian Taylor
ID: 41796936
Thanks, does this look right:

The subnet is

ip access-list extended "music dept in"
     10 deny ip
     20 permit udp eq 53
     30 permit udp eq 53
     40 permit tcp eq 80
     50 permit tcp eq 443
     60 deny ip
LVL 31

Accepted Solution

Predrag earned 2000 total points
ID: 41797275
To me looks too restrictive. The first that pop to my mind  for example is that DHCP traffic will be dropped and clients will not be able to get IP address dynamically and as result DNSs that you configured in ACL will not be known (so you need to manually configure IP addresses in that VLAN). There could be need for ftp or something else, but I don't know what are requirements for that specific VLAN.

You have bad wildcard mask for is is not

10 deny ip
This will deny traffic from any ip address only to network
But the way you wrote the rest of the ACL you can even remove statement 10 and result will still be the same. :)

And typically can be replaced with keyword any (not sure for all models)
40 permit tcp any eq 80
60 deny ip any any

And you need to apply it to interface in right direction. :)
LVL 31

Expert Comment

ID: 41805022
Also maybe you could use CIDR notation /24 instead of wildcard mask in ACL according to manual Page 10-74.

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Workplace bullying has increased with the use of email and social media. Retain evidence of this with email archiving to protect your employees.
"Any files you do not have backed up in at least two [other] places are files you do not care about."
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question