<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: access-list on VE interface blocks traffic for whole VLAN in ICX Switches</title>
    <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35974#M2376</link>
    <description>Hello Mielch,&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;A Ve on an ICX is same as an SVI on a Cisco layer-3 switch Incase you are familiar with.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;For example:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;vlan 100 name Example_VLAN&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;untag ethernet 1/1/1&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;router-interface ve100&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;interface ve 100&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;ip address 192.168.100.1/24&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;In the above, You build a VLAN, associate it with some interfaces, then associate a VE with the VLAN. That creates the map between the VLAN, interfaces, and VE. Then you configure a VE (virtual interface).&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Now if you are applying an ACL to the Ve interface, it is bound to vlan 100 port.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
    <pubDate>Tue, 07 May 2019 09:21:11 GMT</pubDate>
    <dc:creator>jijo_panangat</dc:creator>
    <dc:date>2019-05-07T09:21:11Z</dc:date>
    <item>
      <title>access-list on VE interface blocks traffic for whole VLAN</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35973#M2375</link>
      <description>Hello all. I will be grateful for the help&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;I have applied ACL on a VE interface and it seems ACL was applied not only on VE but on physical interface too. Is it correct?&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;I have not found any info about it, except for "enable acl-per-port-per-vlan" but am not sure whether it is what i need.&lt;BR /&gt;Thank you.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Tue, 07 May 2019 07:30:11 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35973#M2375</guid>
      <dc:creator>mielch_qwerty</dc:creator>
      <dc:date>2019-05-07T07:30:11Z</dc:date>
    </item>
    <item>
      <title>Re: access-list on VE interface blocks traffic for whole VLAN</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35974#M2376</link>
      <description>Hello Mielch,&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;A Ve on an ICX is same as an SVI on a Cisco layer-3 switch Incase you are familiar with.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;For example:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;vlan 100 name Example_VLAN&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;untag ethernet 1/1/1&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;router-interface ve100&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;interface ve 100&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;ip address 192.168.100.1/24&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;In the above, You build a VLAN, associate it with some interfaces, then associate a VE with the VLAN. That creates the map between the VLAN, interfaces, and VE. Then you configure a VE (virtual interface).&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Now if you are applying an ACL to the Ve interface, it is bound to vlan 100 port.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Tue, 07 May 2019 09:21:11 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35974#M2376</guid>
      <dc:creator>jijo_panangat</dc:creator>
      <dc:date>2019-05-07T09:21:11Z</dc:date>
    </item>
    <item>
      <title>Re: access-list on VE interface blocks traffic for whole VLAN</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35975#M2377</link>
      <description>Hi &lt;A alt="" href="https://forums.ruckuswireless.com/ruckuswireless/people/jijo_panangat" name="" rel="nofollow" target="" title="" type="" value=""&gt;Jijo Panangat&lt;/A&gt;, &lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;thanks for answer, but it's a little bit different, so i have 3 switches with vlan 1&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;SW1-----------ICX-----------SW2 &lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;1.1.1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1.1.1.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1.1.1.3&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;ICX has a config&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;vlan 1&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;untagged e 1/1/1 to e 1/1/2&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;router-interface ve 1&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;int&amp;nbsp; ve 1&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;ip add  1.1.1.2&amp;nbsp; 255.255.255.0&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;ip access-group TEST in&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;ip access-list TEST&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; deny ip any any&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;And with such a config i can't ping SW2 from SW1 and back&amp;nbsp; as if there is an access-list on interfaces e 1/1/1 and 1/1/2&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Tue, 07 May 2019 09:43:01 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35975#M2377</guid>
      <dc:creator>mielch_qwerty</dc:creator>
      <dc:date>2019-05-07T09:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: access-list on VE interface blocks traffic for whole VLAN</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35976#M2378</link>
      <description>Hello Mielch,&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;This is expected. The inbound packets are denied by the ACL on ports 1/1/1 &amp;amp; 1/1/2.</description>
      <pubDate>Tue, 07 May 2019 10:47:30 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35976#M2378</guid>
      <dc:creator>jijo_panangat</dc:creator>
      <dc:date>2019-05-07T10:47:30Z</dc:date>
    </item>
    <item>
      <title>Re: access-list on VE interface blocks traffic for whole VLAN</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35977#M2379</link>
      <description>but there are no ACL on ports 1/1/1 &amp;amp; 1/1/2, just on VE 1. &lt;BR /&gt;Can i change this behavior or just have to keep that in mind?&lt;BR /&gt;In cisco wolrld it is quite different and ACL on SVI doesn't block traffic on physical interfaces.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Tue, 07 May 2019 11:04:57 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35977#M2379</guid>
      <dc:creator>mielch_qwerty</dc:creator>
      <dc:date>2019-05-07T11:04:57Z</dc:date>
    </item>
    <item>
      <title>Re: access-list on VE interface blocks traffic for whole VLAN</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35978#M2380</link>
      <description>Hello Mielch,&lt;BR /&gt;&lt;BR /&gt;Ve 1 is mapped to vlan 1 above. so the ACL applies to the vlan 1 ports 1/1/1 &amp;amp; 1/1/2.</description>
      <pubDate>Tue, 07 May 2019 11:25:08 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35978#M2380</guid>
      <dc:creator>jijo_panangat</dc:creator>
      <dc:date>2019-05-07T11:25:08Z</dc:date>
    </item>
    <item>
      <title>Re: access-list on VE interface blocks traffic for whole VLAN</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35979#M2381</link>
      <description>ok, thank you for help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; that's a pity though, that this behavior is not mentioned in any documentation</description>
      <pubDate>Tue, 07 May 2019 11:34:03 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35979#M2381</guid>
      <dc:creator>mielch_qwerty</dc:creator>
      <dc:date>2019-05-07T11:34:03Z</dc:date>
    </item>
    <item>
      <title>Re: access-list on VE interface blocks traffic for whole VLAN</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35980#M2382</link>
      <description>Hello Mielch,&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;The use cases for 'enable acl-per-port-per-vlan' feature is covered in the following link.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;A alt="" href="http://docs.ruckuswireless.com/fastiron/08.0.70/fastiron-08070-securityguide/GUID-EA33A883-46A8-491D-BCB3-402F43A5ED69.html" name="" rel="nofollow" target="" title="" type="" value=""&gt;http://docs.ruckuswireless.com/fastiron/08.0.70/fastiron-08070-securityguide/GUID-EA33A883-46A8-491D-BCB3-402F43A5ED69.html&lt;/A&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;A alt="" href="http://docs.ruckuswireless.com/fastiron/08.0.70/fastiron-08070-securityguide/GUID-E82574D9-45DD-4845-A388-8D5D4D076AEE.html" name="" rel="nofollow" target="" title="" type="" value=""&gt;http://docs.ruckuswireless.com/fastiron/08.0.70/fastiron-08070-securityguide/GUID-E82574D9-45DD-4845-A388-8D5D4D076AEE.html&lt;/A&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;A alt="" href="http://docs.ruckuswireless.com/fastiron/08.0.70/fastiron-08070-securityguide/GUID-5F3FA3B6-93F2-4D24-A0CA-C75321216A88.html" name="" rel="nofollow" target="" title="" type="" value=""&gt;http://docs.ruckuswireless.com/fastiron/08.0.70/fastiron-08070-securityguide/GUID-5F3FA3B6-93F2-4D24-A0CA-C75321216A88.html&lt;/A&gt;&amp;nbsp;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Tue, 07 May 2019 11:54:26 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35980#M2382</guid>
      <dc:creator>jijo_panangat</dc:creator>
      <dc:date>2019-05-07T11:54:26Z</dc:date>
    </item>
    <item>
      <title>Re: access-list on VE interface blocks traffic for whole VLAN</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35981#M2383</link>
      <description>To expound on what Jijo Panagat said:&lt;BR /&gt;&lt;BR /&gt;On both platforms you put the ACL on the actual Layer-3 Interface whatever that happens to be...&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;B&gt;ICX Device:&lt;/B&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;vlan 100 name Example_VLAN&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;untag ethernet 1/1/1&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;router-interface ve100&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;!&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;interface ve 100&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;port-name Some_Description_Here&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;ip address 192.168.100.1/24&lt;BR /&gt;&amp;nbsp;ip access-group NAME out&lt;BR /&gt;!&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;B&gt;Cisco:&lt;/B&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;vlan 100&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;name Example_VLAN&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;!&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Interface GigabitEthernet1/1/1&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;switchport access vlan 100&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;switchport mode access&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;!&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;interface Vlan100&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;description Some_Description_Here&lt;BR /&gt;&amp;nbsp;ip address 192.168.100.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip access-group NAME out&lt;BR /&gt;!&lt;BR /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;**********&lt;BR /&gt;&lt;BR /&gt;If you want to filter egress traffic, make any rule with a source and destination, or filter a specific protocol &amp;amp; port such as TCP or UDP you need to use an extended access list.&amp;nbsp; Either way extended access lists are more flexible in that you can also use them to match ingress traffic if you choose.&lt;BR /&gt;&lt;BR /&gt;If you want to simply match the source, you can use a standard ACL.&amp;nbsp; These are usually for who has access to SSH or similar though in practice.&lt;BR /&gt;&lt;BR /&gt;The above example assumes an extended, named access list.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Tue, 07 May 2019 12:37:01 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35981#M2383</guid>
      <dc:creator>netwizz</dc:creator>
      <dc:date>2019-05-07T12:37:01Z</dc:date>
    </item>
    <item>
      <title>Re: access-list on VE interface blocks traffic for whole VLAN</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35982#M2384</link>
      <description>Hi &lt;A alt="" href="https://forums.ruckuswireless.com/ruckuswireless/people/justin_birkhofer" name="" rel="nofollow" target="" title="" type="" value=""&gt;NETWizz&lt;/A&gt;, &lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Cisco doesn't block traffic on physical interfaces by applying ACL on SVI, while ICX does.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Tue, 07 May 2019 13:22:40 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35982#M2384</guid>
      <dc:creator>mielch_qwerty</dc:creator>
      <dc:date>2019-05-07T13:22:40Z</dc:date>
    </item>
    <item>
      <title>Re: access-list on VE interface blocks traffic for whole VLAN</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35983#M2385</link>
      <description>Cisco certainly blocks the traffic when you apply the ACL to an SVI.&amp;nbsp; Not saying whether it logically gets dropped on on the SVI vs the physical interface, but either way the traffic gets dropped.&lt;BR /&gt;&lt;BR /&gt;Case and point, I have a pair of 6509's with the 2T supervisor, and there are a couple of SVIs with ACLS, and they clearly block the traffic from passing before routing occurs.&lt;BR /&gt;&lt;BR /&gt;Now, if you are saying the that I have two access-port interfaces in a VLAN, and that VLAN has an SVI that traffic does not get blocked from physical-interface to physical-interface within the same VLAN that is true.&amp;nbsp; That said, it does get dropped when the SVI comes into play for layer-3 functionality like traffic leaving its layer-2 subnet and a routing table being consulted to get it to some other destination subnet.&lt;BR /&gt;&lt;BR /&gt;****&lt;BR /&gt;&lt;BR /&gt;Are you saying if you put an ACL on an ICX VRI (i.e. a VE), that it will also filter the traffic between multiple physical interfaces within that same VLAN if routing doesn't occur?&lt;BR /&gt;&lt;BR /&gt;Just asking because usually the Cisco Software Virtual Interfaces (SVIs) and the ICX Virtual Router Interfaces (VRIs) serve predominantly as default-gateways to get off a local subnet within a given VLAN, so there is usually Layer-3 routing involved regardless of the platform.</description>
      <pubDate>Tue, 07 May 2019 14:16:14 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35983#M2385</guid>
      <dc:creator>netwizz</dc:creator>
      <dc:date>2019-05-07T14:16:14Z</dc:date>
    </item>
    <item>
      <title>Re: access-list on VE interface blocks traffic for whole VLAN</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35984#M2386</link>
      <description>&lt;BLOCKQUOTE alt="" name="" rel="" target="" title="" type="" value=""&gt;Are you saying if you put an ACL on an ICX VRI (i.e. a VE), that it will
 also filter the traffic between multiple physical interfaces within 
that same VLAN if routing doesn't occur?&lt;/BLOCKQUOTE&gt;That's the thing! &lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;SW1-----------ICX-----------SW2 &lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;1.1.1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1.1.1.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1.1.1.3&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;ICX has a config&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;vlan 1&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;untagged e 1/1/1 to e 1/1/2&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;router-interface ve 1&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;int&amp;nbsp; ve 1&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;ip add  1.1.1.2&amp;nbsp; 255.255.255.0&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;ip access-group TEST in&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;ip access-list TEST&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; deny ip any any&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;And with such a config i can't ping SW2 from SW1 and vice versa. I have made such an ACL on production network yesterday and got an unpleasant outage and today i am checking it in test environment and the result is the same with or without "enable acl-per-port-per-vlan" command.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Tue, 07 May 2019 14:30:06 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35984#M2386</guid>
      <dc:creator>mielch_qwerty</dc:creator>
      <dc:date>2019-05-07T14:30:06Z</dc:date>
    </item>
    <item>
      <title>Re: access-list on VE interface blocks traffic for whole VLAN</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35985#M2387</link>
      <description>Thanks to &lt;A alt="" href="https://www.reddit.com/r/Brocade/" name="" rel="nofollow" target="" title="" type="" value=""&gt;r/Brocade&lt;/A&gt; on reddit i have found an explanation.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;There is routing code on ICX and ve interface is like a subinterface on a cisco router other than an interface vlan on a cisco switch. Thats why the ACL behavior on VE is so.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Fri, 10 May 2019 12:32:55 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/35985#M2387</guid>
      <dc:creator>mielch_qwerty</dc:creator>
      <dc:date>2019-05-10T12:32:55Z</dc:date>
    </item>
    <item>
      <title>Re: access-list on VE interface blocks traffic for whole VLAN</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/81820#M5818</link>
      <description>&lt;P&gt;It will absolutely block intervlan traffic if not explicitly allowed, it for some reason applies to ANY traffic in that vlan almost like a VACL. I ran into this issue a few years back, so I always put an allow statement at the beginning to and from the subnet on the VRI. Not only that, last night I moved some of my VRIs to a firewall and shut down the old interfaces on the brocade, however the ACLs were still applying to the traffic! I don’t know who designed it to work this way but I cannot see a single use-case for an ACL to apply to a shut down SVI, they certainly have a unique understanding of how ACLs should work. That little quirk lost us 3 hours of business and 10 hours of my life.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 18:03:35 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/access-list-on-VE-interface-blocks-traffic-for-whole-VLAN/m-p/81820#M5818</guid>
      <dc:creator>QuasarKid</dc:creator>
      <dc:date>2024-07-02T18:03:35Z</dc:date>
    </item>
  </channel>
</rss>

