NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
spopuri
May 08, 2020Aspirant
ACL rules M4300
I would like to create extended ACL's to allow only DHCP and DNS from a subnet to a server.
- Retired_MemberMay 09, 2020
On Web GUI, when you create new rule for the IP ACL, only need input 4 fields as below, all other parameter just keep default config:
Sequence Number: input any value is ok;
Action: Permit
Protocol Type: UDP
Dst L4: input 53/67/68
The ending deny everything rule is default behavior, no need config by manual.
Then go to 'IP Binding Configuration' page, select the correct port that you want to apply this IP ACL rule.
spopuri
May 08, 2020Aspirant
I think the source IP should be any and Destination IP should be any too. - How can I write any IP. Is it 0.0.0.0
Only differentiation is on the three UDP ports Eric provided above. - I have written 3 ACL's. one for port 67, one for port 68 and one for port 53(domain)
The ACL then would be ending with Deny everything at the end in your case. We bind the ACL to the ports in the ingress direction (traffic coming to the interface) - Do you mean I have to write an ACL at the end of this named ACL to deny everything else. Please see attached screenshot for deny everything else
Retired_Member
May 09, 2020
On Web GUI, when you create new rule for the IP ACL, only need input 4 fields as below, all other parameter just keep default config:
Sequence Number: input any value is ok;
Action: Permit
Protocol Type: UDP
Dst L4: input 53/67/68
The ending deny everything rule is default behavior, no need config by manual.
Then go to 'IP Binding Configuration' page, select the correct port that you want to apply this IP ACL rule.
- spopuriMay 09, 2020Aspirant
Don't I have to mention the port number in the source L4?
- Retired_MemberMay 11, 2020
- spopuriMay 12, 2020Aspirant
Retired_Member: Thank you very much for your response.
I will also create another ACL to allow traffic on certain ports from clients to server. Whereas in the destination IP I will mention the server's IP address.
Thanks,
Sravan
- Retired_MemberMay 13, 2020
Not suggest limit destination IP with Server's IP address, as on DHCP protocol is bidirectional packet(Client<->Server, and Discover/Request packet is broadcast----mean DIP is broadcast IP, not Server's IP, Offer/ACK/Release is Unicast--maybe SIP/DIP is Server's IP). If you only allowed DIP=Server's IP, it will casue some DHCP packet are dropped by ACL rules, then Client cannot get IP address from Server.
Related Content
NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!