- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
TCP Port ACL rules M4300 Help
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi all, I am looking for some assistance.
I have a m4300 52-port managed switch, which I have configured to utilise multiple VLANs. In addition, I have set up an ACL to prevent undesired communication between VLANs using Advanced - IP Extended Rules. I have included specific rules in the ACL to allow the Internet gateway IP for each VLAN, incorporating both IP and host-based rules.
Now, I have a Unify U6 Pro Access Point that offers a hotspot service for guest Wi-Fi. To enable the guest portal functionality, I must permit all VLANs to access a particular host IP on specific TCP port(s). For instance, I must allow access to 192.168.50.203 only on ports 8880 and 8883. Despite my attempts, I haven't been successful so far. I only managed to make it work by allowing all VLANs access to the host IP using a host rule.
I wonder if anyone could advise me on how to get it working using TCP port rules.
TCP Port rules - not working
Working using IP Host rule
Solved! Go to Solution.
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @Mikeemikew,
I am not sure how the ACL is bound, but there are several ways of doing it. I think, the easiest is to bind it against a VLAN, so that it applies to all devices.
I have tested this here in my lab for you, and can confirm, that the following table works:
access-list 101 permit tcp host 192.168.50.203 192.168.200.0 0.0.0.255 eq 8843
access-list 101 permit tcp host 192.168.50.203 192.168.200.0 0.0.0.255 eq 8880
access-list 101 deny ip 192.168.50.0 0.0.0.255 192.168.5.0 0.0.0.255
access-list 101 deny ip 192.168.50.0 0.0.0.255 192.168.60.0 0.0.0.255
access-list 101 deny ip 192.168.50.0 0.0.0.255 192.168.100.0 0.0.0.255
access-list 101 deny ip 192.168.50.0 0.0.0.255 192.168.200.0 0.0.0.255
access-list 101 permit ip any any
ip access-group 101 vlan 50 in 1
In the GUI, this would be as followed:
Then, you have to bind it against the vlan, as followed:
As example, my testing:
Give that a try, and it should work just fine 👌.
Once it works, if you can accept this as a solution.
If it doesn't work, can you share your Tech Support file, happy to have a look at it.
You can retrieve your TS as followed:
Mike
All Replies
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: TCP Port ACL rules M4300 Help
@Mikeemikew wrote:
For instance, I must allow access to 192.168.50.203 only on ports 8880 and 8883.
Well possible, I'm missing the bigger picture here flying over the screenshots in a few seconds while having a quick Espresso. These look much more like source ACE for these IP addresses and ports, not destination ACEs to me.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: TCP Port ACL rules M4300 Help
I followed a specific guide to set up the VLANs and ACLs. https://kb.netgear.com/30818/How-to-configure-routing-VLANs-on-a-NETGEAR-managed-switch-with-shared-...
The overall goal I'm trying to achieve is to have multiple VLANs without any inter-VLAN communication, except for certain exceptions such as the internet gateway, access points, and specific TCP ports for various services.
So far, I believe I have completed all the necessary tasks except for allowing exceptions for TCP ports through the ACLs.
If my approach is incorrect, I would greatly appreciate any advice you can provide.
Thanks in advance.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @Mikeemikew,
I am not sure how the ACL is bound, but there are several ways of doing it. I think, the easiest is to bind it against a VLAN, so that it applies to all devices.
I have tested this here in my lab for you, and can confirm, that the following table works:
access-list 101 permit tcp host 192.168.50.203 192.168.200.0 0.0.0.255 eq 8843
access-list 101 permit tcp host 192.168.50.203 192.168.200.0 0.0.0.255 eq 8880
access-list 101 deny ip 192.168.50.0 0.0.0.255 192.168.5.0 0.0.0.255
access-list 101 deny ip 192.168.50.0 0.0.0.255 192.168.60.0 0.0.0.255
access-list 101 deny ip 192.168.50.0 0.0.0.255 192.168.100.0 0.0.0.255
access-list 101 deny ip 192.168.50.0 0.0.0.255 192.168.200.0 0.0.0.255
access-list 101 permit ip any any
ip access-group 101 vlan 50 in 1
In the GUI, this would be as followed:
Then, you have to bind it against the vlan, as followed:
As example, my testing:
Give that a try, and it should work just fine 👌.
Once it works, if you can accept this as a solution.
If it doesn't work, can you share your Tech Support file, happy to have a look at it.
You can retrieve your TS as followed:
Mike
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: TCP Port ACL rules M4300 Help
MikeD1234, that worked perfectly! I want to express my gratitude for the time you dedicated to investigating and assisting me. I truly appreciate it!
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content