Networking-Forums.com

Professional Discussions => Routing and Switching => Topic started by: mercy_angel on December 18, 2020, 05:00:34 PM

Title: what does this wildcard?
Post by: mercy_angel on December 18, 2020, 05:00:34 PM
Idea is that only one subnet sees and control all other subnets in HQ. I found some configuration for this:

So it was created vlan 10 which access list is
10 permit ip any any
    20 permit icmp any any


and for  vlan 20 (all vlans are the same in terms of access list)

    10 deny ip any 192.168.0.0 0.0.128.255
    20 permit ip any any
    30 permit icmp any any

So what is that wildcard 0.0.128.255.
That vlan20 still can reach vlan 10 but it shouldnt. VLAN10 is it department, only that vlan should see all vlans, but that vlans cant see IT VLAN.
Where is mistake?
I tried to change first rule in vlan20 with

    10 deny ip any 192.168.0.0 0.0.255.255
   

but than vlan 10 which is IT cant see VLAN20
Title: Re: what does this wildcard?
Post by: deanwebb on December 20, 2020, 07:42:20 PM
So, to know what exactly is going on, we would need to know the IP range of VLAN 10, IP range of VLAN 20, and what gear you have the ACL on.

But on Cisco switches, which I'm guessing you're using, the wildcard is an inverse match for the IP range in the ACL rule.
Title: Re: what does this wildcard?
Post by: Dieselboy on December 20, 2020, 08:37:21 PM
Sounds like OP is using VLAN ACL (VACL) and they're not straight forward at all. There are other considerations when using VACL. I googled for some info on this and found a youtube vid "Explaining VACL" that may be helpful to the OP: https://www.youtube.com/watch?v=A4Mt1Vgx-fw

I havnt done this for many years. It is easier for me to choose either alternative:

1. use a firewall to route between these VLANs and do the filtering on the firewall instead of VACL
2. use routed ports (physical port) and then traditional ACL on the ingress of the routed port
Title: Re: what does this wildcard?
Post by: mercy_angel on December 22, 2020, 03:06:50 PM
Quote from: deanwebb on December 20, 2020, 07:42:20 PM
So, to know what exactly is going on, we would need to know the IP range of VLAN 10, IP range of VLAN 20, and what gear you have the ACL on.

But on Cisco switches, which I'm guessing you're using, the wildcard is an inverse match for the IP range in the ACL rule.

why thats important? its two /24 masks.
It can be any for this purposes. VLAN 10 is 192.168.10.0/24 and VLAN 20 is 192.168.20.0/24
But its strange how i found that wildcard in acl, and cant figure out what is forbiden and why vlan 20 can access vlan 10...
Title: Re: what does this wildcard?
Post by: Dieselboy on December 23, 2020, 12:01:17 AM
The wildcard mask looks like a typo. A 17 bit wildcard mask is `0.0.127.255`.

Maybe your office or "site" has a number of /24s which can be described as one larger subnet like a /17. A /17 would give you subnets from 192.168.0.0/24 to 192.168.127.0/24 (or you could say 128 /24's).
Title: Re: what does this wildcard?
Post by: mercy_angel on December 23, 2020, 03:27:58 PM
Quote from: Dieselboy on December 23, 2020, 12:01:17 AM
The wildcard mask looks like a typo. A 17 bit wildcard mask is `0.0.127.255`.

Maybe your office or "site" has a number of /24s which can be described as one larger subnet like a /17. A /17 would give you subnets from 192.168.0.0/24 to 192.168.127.0/24 (or you could say 128 /24's).


Or can you help me, how to get my access list then, because when i put deny 192.168.0.0 0.0.255.255 than the VLAN 10 which must see all subnets also cannot see VLAN20 even if it have permit any any..
Title: Re: what does this wildcard?
Post by: deanwebb on December 24, 2020, 07:42:12 AM
This is where we need the IP ranges of the VLANs in question. Once we have those, we can say with accuracy what impact that ACL is having on their traffic.
Title: Re: what does this wildcard?
Post by: Dieselboy on January 03, 2021, 09:31:23 PM
Quote from: mercy_angel on December 23, 2020, 03:27:58 PM
Quote from: Dieselboy on December 23, 2020, 12:01:17 AM
The wildcard mask looks like a typo. A 17 bit wildcard mask is `0.0.127.255`.

Maybe your office or "site" has a number of /24s which can be described as one larger subnet like a /17. A /17 would give you subnets from 192.168.0.0/24 to 192.168.127.0/24 (or you could say 128 /24's).


Or can you help me, how to get my access list then, because when i put deny 192.168.0.0 0.0.255.255 than the VLAN 10 which must see all subnets also cannot see VLAN20 even if it have permit any any..

Please take a look at the video I posted, it should explain VACLs. The VACLs (VLAN ACLs) are not straight-forward like ACLs.
Title: Re: what does this wildcard?
Post by: mercy_angel on January 05, 2021, 10:22:37 AM
Quote from: deanwebb on December 24, 2020, 07:42:12 AM
This is where we need the IP ranges of the VLANs in question. Once we have those, we can say with accuracy what impact that ACL is having on their traffic.
vlan 10 is 192.168.10.0/24
this vlan should see 192.168.0.0/16
vlan 20 is 192.168.20.0/24 and this vlan and all the others(except vlan10 because vlan10 is IT sector) should see only vlan2 192.168.2.0/24 and thats it. No other vlan allowed.
Title: Re: what does this wildcard?
Post by: deanwebb on January 05, 2021, 11:24:00 AM
VLAN 20 is in the same /16 as VLAN 10, so the VACL that permits to the /16 is going to permit to VLAN 10. Either tighten up the VACL to maybe just the /24, or put it in a different /16, like 192.168.128.0/24.
Title: Re: what does this wildcard?
Post by: mercy_angel on January 06, 2021, 06:32:58 PM
Quote from: deanwebb on January 05, 2021, 11:24:00 AM
VLAN 20 is in the same /16 as VLAN 10, so the VACL that permits to the /16 is going to permit to VLAN 10. Either tighten up the VACL to maybe just the /24, or put it in a different /16, like 192.168.128.0/24.

if I dont put  ip access-group SOME_ACL_NAME in in VLAN100 (10.122.0.0/22), and on VLAN200(10.122.13.0/24) i put ip access-group LAN-FILTER in

and that access list is:
Extended IP access list LAN-FILTER
deny ip any 10.122.0.0 0.0.31.255
deny icmp any 10.122.0.0 0.0.31.255
permit ip any any
permit icmp any any

why I from vlan10 cant ping any other vlans from 10.122.0.0/16??
So in general, if i dont put any acl rule on one subnet it should see explicity all others?

Title: Re: what does this wildcard?
Post by: deanwebb on January 07, 2021, 09:47:36 AM
Those ACL rules match on a /12 range.

And yes, by default, if there is no ACL, all traffic is permitted.
Title: Re: what does this wildcard?
Post by: mercy_angel on January 08, 2021, 02:42:57 PM
Quote from: deanwebb on January 07, 2021, 09:47:36 AM
Those ACL rules match on a /12 range.

And yes, by default, if there is no ACL, all traffic is permitted.

why then i can't ping it?
if i have deny from other vlans, why IT where it hasnt any acls.
Title: Re: what does this wildcard?
Post by: deanwebb on January 08, 2021, 09:37:35 PM
You can't ping it because your mask is too big. Try using 10.122.13.0 0.255.255.255 on the deny statements. Then it will only block traffic to VLAN 200.
Title: Re: what does this wildcard?
Post by: mercy_angel on January 09, 2021, 03:45:24 AM
Quote from: deanwebb on January 08, 2021, 09:37:35 PM
You can't ping it because your mask is too big. Try using 10.122.13.0 0.255.255.255 on the deny statements. Then it will only block traffic to VLAN 200.

vlan 100 is IT deparmtent. This vlan MUST see all vlans. And vlan 200 is some office, and there is a 10,15 more vlans, so it will be same acl rules for them.
Those office vlans must not see any vlans beside their own. Problem is that i dont have ping to that office pcs..
Title: Re: what does this wildcard?
Post by: deanwebb on January 10, 2021, 10:12:57 AM
Couple things here to comment on.

1. Whatever VLAN needs restrictions, gets the ACL. No restrictions, no ACL.
2. ICMP must be permitted in both directions. Otherwise, pings will fail. It can be the same on bidirectional UDP conversations.
3. You can also get the same effects with routing statements that permit some conversations, but which send traffic that is forbidden to a null route.
4. Use a firewall as a router on a stick for better, more granular control of traffic.
Title: Re: what does this wildcard?
Post by: icecream-guy on January 10, 2021, 04:27:00 PM
Quote from: deanwebb on January 10, 2021, 10:12:57 AM
Couple things here to comment on.

2. ICMP must be permitted in both directions. Otherwise, pings will fail. It can be the same on bidirectional UDP conversations.


We want to be restrictive on the ICMP we allow, some is bad,  I might suggest to only allow icmp
echo
echo reply
unreachable
traceroute

only on trusted interfaces, blocked on untrusted interfaces