<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: access list for ports can not block multicast ips in ICX Switches</title>
    <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-for-ports-can-not-block-multicast-ips/m-p/26372#M1270</link>
    <description>Well, you aren't going to like this... I cannot find that option on either a 6450 or a 6610 running 08030sa&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;********&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;I can find it on an ICX 7450, which of course is running a different branch of code... 08070b is what I have installed.&amp;nbsp; Of course, the ICX 64XX is limited to 08030x&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Maybe someone else can chime in.&amp;nbsp; Otherwise, maybe you can drop this at the router.&amp;nbsp; If you are dropping it out-bound, you would want to try an extended access list anyway...&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Lastly, you can get rid of the "deny ip any" statement at the end.&amp;nbsp; That is already implied.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;****&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Usually on switches, you don't apply ACLs on physical interfaces anyway.&amp;nbsp; Where I am going with this is they typically run on Layer-3 interfaces.&amp;nbsp; If you put an IP address on an Interface, well then... go ahead and attach an ACL.&amp;nbsp; Otherwise the common place to put it would be on the SVI or the "interface ve 123" interface.</description>
    <pubDate>Mon, 08 Oct 2018 18:16:59 GMT</pubDate>
    <dc:creator>netwizz</dc:creator>
    <dc:date>2018-10-08T18:16:59Z</dc:date>
    <item>
      <title>access list for ports can not block multicast ips</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-for-ports-can-not-block-multicast-ips/m-p/26369#M1267</link>
      <description>Hello,&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;i have 10x brocade icx 6450 switches so i have a acl like as following :&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Standard IP access list port5: 2 entries&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;permit host x.x.x.x&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;deny any&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;then i have applied it to a port switch which is connected to&amp;nbsp;x.x.x.x and when i send tcp syn attack with random source i see all sources dropped at port level but sources like as 224.0.0.0 reach my router!&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;why does access list does not block multicast ips?! its really strange because i have deny any at end of my access list!&lt;BR /&gt;so can anyone help me with this?&lt;BR /&gt;thanks&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Mon, 08 Oct 2018 17:44:28 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-for-ports-can-not-block-multicast-ips/m-p/26369#M1267</guid>
      <dc:creator>farid_hajizeina</dc:creator>
      <dc:date>2018-10-08T17:44:28Z</dc:date>
    </item>
    <item>
      <title>Re: access list for ports can not block multicast ips</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-for-ports-can-not-block-multicast-ips/m-p/26370#M1268</link>
      <description>I believe those are considered multicast reserved or IGMP.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;A alt="" href="http://docs.ruckuswireless.com/fastiron/08.0.60/fastiron-08060-ipmulticastguide/GUID-6540A2CF-04B3-4E0A-BB25-6BCF55B6096B.html" name="" rel="nofollow" target="" title="Link httpdocsruckuswirelesscomfastiron08060fastiron-08060-ipmulticastguideGUID-6540A2CF-04B3-4E0A-BB25-6BCF55B6096Bhtml" type="" value=""&gt;http://docs.ruckuswireless.com/fastiron/08.0.60/fastiron-08060-ipmulticastguide/GUID-6540A2CF-04B3-4...&lt;/A&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;You probably want to look at "Disabling the flooding of unregistered IPv4 multicast frames in an IGMP-snooping-enabled VLAN"&lt;BR /&gt;&lt;BR /&gt;08.0.30 probably has the same settings...</description>
      <pubDate>Mon, 08 Oct 2018 17:54:23 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-for-ports-can-not-block-multicast-ips/m-p/26370#M1268</guid>
      <dc:creator>netwizz</dc:creator>
      <dc:date>2018-10-08T17:54:23Z</dc:date>
    </item>
    <item>
      <title>Re: access list for ports can not block multicast ips</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-for-ports-can-not-block-multicast-ips/m-p/26371#M1269</link>
      <description>i&amp;nbsp; have 8.0.30 but i can not use ip multicast disable flood...&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;see this :&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; Copyright (c) 1996-2015 Brocade Communications Systems, Inc. All rights reserved.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; &amp;nbsp; UNIT 1: compiled on Dec&amp;nbsp; 9 2015 at 22:16:02 labeled as ICX64R08030e&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; (9784800 bytes) from Secondary secondary&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; SW: Version 08.0.30eT313&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; Boot-Monitor Image size = 776680, Version:07.4.01T310 (kxz07401)&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; HW: Stackable ICX6450-48&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;==========================================================================&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;UNIT 1: SL 1: ICX6450-48 48-port Management Module&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Serial&amp;nbsp; #: BZ6D&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;License: ICX6450_PREM_ROUTER_SOFT_PACKAGE&amp;nbsp; &amp;nbsp;(LID: df)&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;P-ENGINE&amp;nbsp; 0: type DEF0, rev 01&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;P-ENGINE&amp;nbsp; 1: type DEF0, rev 01&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;==========================================================================&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;UNIT 1: SL 2: ICX6450-SFP-Plus 4port 40G Module&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;==========================================================================&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; 800 MHz ARM processor ARMv5TE, 400 MHz bus&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;65536 KB flash memory&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; 512 MB DRAM&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;STACKID 1&amp;nbsp; system uptime is 95 day(s) 19 hour(s) 17 minute(s) 40 second(s)&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;The system : started=cold start&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;A href="mailto:SSH@ICX6450.302.K11" rel="nofollow"&gt;SSH@ICX6450.302.K11&lt;/A&gt;(config)#ip multicast&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; active&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; IGMP snooping: device generates IGMP queries&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; age-interval&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; IGMP snooping: membership aging. dft: 260s (&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; robustness*query-interval + max response time)&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; leave-wait-time&amp;nbsp; &amp;nbsp; &amp;nbsp;IGMP snooping: stop traffic wait time. dft: 2s&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; max-response-time&amp;nbsp; &amp;nbsp;IGMP snooping: query max response time, 1-10s, dft: 10&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; mcache-age&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; IGMP snooping: remove mcache if no traffic. dft: 60s&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; passive&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;IGMP snooping: device listens for IGMP packets&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; query-interval&amp;nbsp; &amp;nbsp; &amp;nbsp; IGMP snooping: time to send queries. dft: 125s&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; report-control&amp;nbsp; &amp;nbsp; &amp;nbsp; IGMP snooping: rate limit reports to router (querier)&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ports, same as ip igmp-report-control&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; robustness&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Robustness variable: 1-7, dft: 2&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; verbose-off&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;IGMP snooping: does not print warning/error messages&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; version&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;IGMP snooping: version 2 or 3. dft: 2&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; &lt;CR&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;A href="mailto:SSH@ICX6450.302.K11" rel="nofollow"&gt;SSH@ICX6450.302.K11&lt;/A&gt;(config)#ip multicast&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;/CR&gt;</description>
      <pubDate>Mon, 08 Oct 2018 18:02:36 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-for-ports-can-not-block-multicast-ips/m-p/26371#M1269</guid>
      <dc:creator>farid_hajizeina</dc:creator>
      <dc:date>2018-10-08T18:02:36Z</dc:date>
    </item>
    <item>
      <title>Re: access list for ports can not block multicast ips</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-for-ports-can-not-block-multicast-ips/m-p/26372#M1270</link>
      <description>Well, you aren't going to like this... I cannot find that option on either a 6450 or a 6610 running 08030sa&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;********&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;I can find it on an ICX 7450, which of course is running a different branch of code... 08070b is what I have installed.&amp;nbsp; Of course, the ICX 64XX is limited to 08030x&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Maybe someone else can chime in.&amp;nbsp; Otherwise, maybe you can drop this at the router.&amp;nbsp; If you are dropping it out-bound, you would want to try an extended access list anyway...&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Lastly, you can get rid of the "deny ip any" statement at the end.&amp;nbsp; That is already implied.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;****&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Usually on switches, you don't apply ACLs on physical interfaces anyway.&amp;nbsp; Where I am going with this is they typically run on Layer-3 interfaces.&amp;nbsp; If you put an IP address on an Interface, well then... go ahead and attach an ACL.&amp;nbsp; Otherwise the common place to put it would be on the SVI or the "interface ve 123" interface.</description>
      <pubDate>Mon, 08 Oct 2018 18:16:59 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-for-ports-can-not-block-multicast-ips/m-p/26372#M1270</guid>
      <dc:creator>netwizz</dc:creator>
      <dc:date>2018-10-08T18:16:59Z</dc:date>
    </item>
    <item>
      <title>Re: access list for ports can not block multicast ips</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-for-ports-can-not-block-multicast-ips/m-p/26373#M1271</link>
      <description>My switches are working in layer 2 ... So your mean is maybe with extended acl i will be able to control this?
&lt;BR /&gt;
Actually i do not want this traffic reach my router ... Any other idea?</description>
      <pubDate>Mon, 08 Oct 2018 18:39:14 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-for-ports-can-not-block-multicast-ips/m-p/26373#M1271</guid>
      <dc:creator>farid_hajizeina</dc:creator>
      <dc:date>2018-10-08T18:39:14Z</dc:date>
    </item>
    <item>
      <title>Re: access list for ports can not block multicast ips</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-for-ports-can-not-block-multicast-ips/m-p/26374#M1272</link>
      <description>Generally speaking, ACLs work at Layer-3.&amp;nbsp; I have always put them on Layer-3 interfaces.&amp;nbsp; That is all that I am saying.&amp;nbsp; I am not saying it won't work otherwise only that I haven't tried it that way.&amp;nbsp; Most switchports really do not examine all the way up to the packet.&amp;nbsp; The really deal with VLAN membership and whether or not it's tagged looking only at the Layer-2 Frame to make forwarding decisions.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Any reason why you can't drop it at your router?&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;If you are going to drop it on a switch with a standard ACL, it would be placed on the ingress interface that receives the traffic if it is going to work at all.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;If you want to drop outbound traffic, that would require a direction and an extended ACL be applied.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Personally, I would probably just drop it on the router provided the reason you want to drop it earlier isn't to try and keep congestion off of a slow link.</description>
      <pubDate>Mon, 08 Oct 2018 18:53:24 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-for-ports-can-not-block-multicast-ips/m-p/26374#M1272</guid>
      <dc:creator>netwizz</dc:creator>
      <dc:date>2018-10-08T18:53:24Z</dc:date>
    </item>
  </channel>
</rss>

