<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Inbound ACL in ICX Switches</title>
    <link>https://community.ruckuswireless.com/t5/ICX-Switches/Inbound-ACL/m-p/94266#M6718</link>
    <description>&lt;P&gt;* addresses are anonymized *&lt;BR /&gt;* I have 2 issues&lt;BR /&gt;1. ACL was working in test environment but not in production even though everything is the same&lt;BR /&gt;2. Understanding how inbound traffic is processed on a virtual interface&lt;BR /&gt;* int ve 150 is the public facing interface, that is the only interface with an ACL applied to it. I am not filtering any outbound traffic.&lt;BR /&gt;* fc00:fc00:fc00:16::/64 is the internal network&lt;BR /&gt;* fc00:f390:0:2002::c6/126 is the public network connected to the ISP&lt;/P&gt;&lt;P&gt;1. I am trying to set up an acl to filter inbound ipv6 traffic on our public facing interfaces on our router. I want to structure it as default deny and allow specific protocols, ports, and addresses. In a test environment, I was able to get this working, but in production it is not working at all. Which is quite strange. I will post my configuration below. The test and production is using the exact same model switch and running the same router code.&lt;/P&gt;&lt;P&gt;// the ipv6 acl that is applied inbound&lt;BR /&gt;ipv6 access-list in-v6&lt;BR /&gt;remark ping&lt;BR /&gt;permit icmp any any&lt;BR /&gt;remark dns&lt;BR /&gt;permit udp any any eq dns&lt;BR /&gt;permit tcp any any eq dns&lt;BR /&gt;remark http&lt;BR /&gt;permit tcp any any eq http&lt;BR /&gt;remark https&lt;BR /&gt;permit tcp any any eq ssl&lt;BR /&gt;remark ssh&lt;BR /&gt;permit tcp any any eq ssh sequence 60&lt;BR /&gt;remark "allow internal tcp connections"&lt;BR /&gt;permit tcp fc00:fc00:fc00::/44 any established sequence 70&lt;BR /&gt;remark-entry sequence 75 "allow all other traffic to this_vlan"&lt;BR /&gt;permit ipv6 any fc00:fc00:fc00:16::/64 sequence 75&lt;BR /&gt;permit ipv6 fc00:fc00:fc00:16::/64 any sequence 76&lt;BR /&gt;remark deny all other traffic&lt;BR /&gt;deny ipv6 any any&lt;/P&gt;&lt;P&gt;// public facing interface&lt;BR /&gt;interface ve 150&lt;BR /&gt;port-name ISP-BGP&lt;BR /&gt;ip address 192.168.1.250/29&lt;BR /&gt;ip access-group ipv4-acl in&lt;BR /&gt;ip access-group ipv4-acl out&lt;BR /&gt;ip mtu 9000&lt;BR /&gt;ipv6 address fc00:f390:0:2002::c6/126&lt;BR /&gt;ipv6 enable&lt;BR /&gt;ipv6 traffic-filter in-v6 in&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;2. There is something I may be misunderstanding about inbound traffic. Let me give an example of what I noticed. In the ACL above, in-v6, I have a rule for ssh traffic to permit tcp from any source to any destination on port 22. When testing, this allows public hosts to ssh into internal hosts, but it is not allowing internal hosts to ssh into public hosts. Unless I add another rule saying "permit tcp any eq 22 any" compared to "permit tcp any any eq". Can someone explain this?&lt;/P&gt;&lt;P&gt;Hopefully this makes sense. Thanks for any and all insight.&lt;/P&gt;</description>
    <pubDate>Thu, 01 Aug 2024 16:19:23 GMT</pubDate>
    <dc:creator>kransom</dc:creator>
    <dc:date>2024-08-01T16:19:23Z</dc:date>
    <item>
      <title>Inbound ACL</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Inbound-ACL/m-p/94266#M6718</link>
      <description>&lt;P&gt;* addresses are anonymized *&lt;BR /&gt;* I have 2 issues&lt;BR /&gt;1. ACL was working in test environment but not in production even though everything is the same&lt;BR /&gt;2. Understanding how inbound traffic is processed on a virtual interface&lt;BR /&gt;* int ve 150 is the public facing interface, that is the only interface with an ACL applied to it. I am not filtering any outbound traffic.&lt;BR /&gt;* fc00:fc00:fc00:16::/64 is the internal network&lt;BR /&gt;* fc00:f390:0:2002::c6/126 is the public network connected to the ISP&lt;/P&gt;&lt;P&gt;1. I am trying to set up an acl to filter inbound ipv6 traffic on our public facing interfaces on our router. I want to structure it as default deny and allow specific protocols, ports, and addresses. In a test environment, I was able to get this working, but in production it is not working at all. Which is quite strange. I will post my configuration below. The test and production is using the exact same model switch and running the same router code.&lt;/P&gt;&lt;P&gt;// the ipv6 acl that is applied inbound&lt;BR /&gt;ipv6 access-list in-v6&lt;BR /&gt;remark ping&lt;BR /&gt;permit icmp any any&lt;BR /&gt;remark dns&lt;BR /&gt;permit udp any any eq dns&lt;BR /&gt;permit tcp any any eq dns&lt;BR /&gt;remark http&lt;BR /&gt;permit tcp any any eq http&lt;BR /&gt;remark https&lt;BR /&gt;permit tcp any any eq ssl&lt;BR /&gt;remark ssh&lt;BR /&gt;permit tcp any any eq ssh sequence 60&lt;BR /&gt;remark "allow internal tcp connections"&lt;BR /&gt;permit tcp fc00:fc00:fc00::/44 any established sequence 70&lt;BR /&gt;remark-entry sequence 75 "allow all other traffic to this_vlan"&lt;BR /&gt;permit ipv6 any fc00:fc00:fc00:16::/64 sequence 75&lt;BR /&gt;permit ipv6 fc00:fc00:fc00:16::/64 any sequence 76&lt;BR /&gt;remark deny all other traffic&lt;BR /&gt;deny ipv6 any any&lt;/P&gt;&lt;P&gt;// public facing interface&lt;BR /&gt;interface ve 150&lt;BR /&gt;port-name ISP-BGP&lt;BR /&gt;ip address 192.168.1.250/29&lt;BR /&gt;ip access-group ipv4-acl in&lt;BR /&gt;ip access-group ipv4-acl out&lt;BR /&gt;ip mtu 9000&lt;BR /&gt;ipv6 address fc00:f390:0:2002::c6/126&lt;BR /&gt;ipv6 enable&lt;BR /&gt;ipv6 traffic-filter in-v6 in&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;2. There is something I may be misunderstanding about inbound traffic. Let me give an example of what I noticed. In the ACL above, in-v6, I have a rule for ssh traffic to permit tcp from any source to any destination on port 22. When testing, this allows public hosts to ssh into internal hosts, but it is not allowing internal hosts to ssh into public hosts. Unless I add another rule saying "permit tcp any eq 22 any" compared to "permit tcp any any eq". Can someone explain this?&lt;/P&gt;&lt;P&gt;Hopefully this makes sense. Thanks for any and all insight.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2024 16:19:23 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Inbound-ACL/m-p/94266#M6718</guid>
      <dc:creator>kransom</dc:creator>
      <dc:date>2024-08-01T16:19:23Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound ACL</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Inbound-ACL/m-p/94614#M6730</link>
      <description>&lt;P&gt;Hi Kransom&lt;/P&gt;&lt;P&gt;Thank you for reaching us&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Below is an explanation of the differences between the two commands:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Command:&lt;/STRONG&gt;&lt;FONT face="courier new,courier" size="2"&gt; "permit tcp any eq 22 any"&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This rule allows any internal source to initiate an SSH connection to any external destination on port 22.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Example from switch CLI:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT face="courier new,courier" size="2"&gt;ICX8200-24P Router(config-ipv6acl-in-v6)#permit tcp any eq 22 &lt;FONT color="#008000"&gt;?&lt;/FONT&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2" color="#008000"&gt;any Any destination host&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;X:X::X:X/M IPv6 destination prefix&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;host A single destination host&lt;/FONT&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Command :&lt;/STRONG&gt; &lt;FONT face="courier new,courier" size="2"&gt;"permit tcp any any eq"&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This rule allows any external source to initiate an SSH connection to any internal destination. For internal hosts to initiate SSH connections to external hosts, you need a rule that permits outbound traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Example from switch CLI:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT face="courier new,courier" size="2"&gt;ICX8200-24P Router(config-ipv6acl-in-v6)#permit tcp any&lt;FONT color="#008000"&gt; ?&lt;/FONT&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2" color="#008000"&gt;any Any source host&lt;/FONT&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You can also note the difference when you use &lt;FONT face="courier new,courier" size="2" color="#008000"&gt;"?" &lt;/FONT&gt;following the commands and checking the descriptions.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2024 12:17:11 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Inbound-ACL/m-p/94614#M6730</guid>
      <dc:creator>Chandini</dc:creator>
      <dc:date>2024-08-07T12:17:11Z</dc:date>
    </item>
  </channel>
</rss>

