Microsoft
Software
Hardware
Network
Question : access list on core switch for restricted guest access
im having a problem understanding how this access list i have applied to vlan 997 and 999 is prohibiting access to my corporate network from the guest network
(GuestWireless
, PhysicianAccess).
i have listed my running config from my core switch. i am running 3 cisco wireless lan controllers that are connected to this switch via etherchannel. I can however access my guest network from my other vlans (which is fine). I would really appreciate someone helping me understand how this works. Thanks for your responses.
Current configuration : 12597 bytes
!
version 12.2
no service pad
service timestamps debug uptime
service timestamps log datetime
no service password-encryption
service sequence-numbers
!
hostname BigBoy
!
!
no aaa new-model
clock timezone CST -6
clock summer-time CST recurring
switch 1 provision ws-c3750g-12s
switch 2 provision ws-c3750g-12s
switch 3 provision ws-c3750g-12s
system mtu routing 1500
ip subnet-zero
ip routing
no ip domain-lookup
ip dhcp excluded-address 172.20.142.1 172.20.142.50
ip dhcp excluded-address 172.20.108.1 172.20.108.50
ip dhcp excluded-address 172.20.106.1 172.20.106.50
ip dhcp excluded-address 172.20.104.1 172.20.104.50
ip dhcp excluded-address 172.20.118.1 172.20.118.50
ip dhcp excluded-address 172.20.136.1 172.20.136.50
ip dhcp excluded-address 172.20.138.1 172.20.138.50
ip dhcp excluded-address 172.20.102.1 172.20.102.50
ip dhcp excluded-address 172.20.140.1 172.20.140.50
ip dhcp excluded-address 172.20.116.1 172.20.116.50
ip dhcp excluded-address 172.20.124.1 172.20.124.50
ip dhcp excluded-address 172.20.114.1 172.20.114.50
ip dhcp excluded-address 172.20.122.1 172.20.122.50
ip dhcp excluded-address 172.21.0.1 172.21.253.255
!
ip dhcp pool MAIN3rdFloor
network 172.20.142.0 255.255.254.0
default-router 172.20.142.1
domain-name butta.org
dns-server 172.20.45.122 172.20.45.121
!
ip dhcp pool Nursing8th
network 172.20.108.0 255.255.254.0
default-router 172.20.108.1
domain-name butta.org
dns-server 172.20.45.122 172.20.45.121
!
ip dhcp pool ICU6th
network 172.20.106.0 255.255.254.0
default-router 172.20.106.1
domain-name butta.org
dns-server 172.20.45.122 172.20.45.121
!
ip dhcp pool Nursing4th
network 172.20.104.0 255.255.254.0
default-router 172.20.104.1
domain-name butta.org
dns-server 172.20.45.122 172.20.45.121
!
ip dhcp pool Surgery3rd
network 172.20.118.0 255.255.254.0
default-router 172.20.118.1
domain-name butta.org
dns-server 172.20.45.122 172.20.45.121
!
ip dhcp pool WCNorth3rd
network 172.20.136.0 255.255.254.0
default-router 172.20.136.1
domain-name butta.org
dns-server 172.20.45.122 172.20.45.121
!
ip dhcp pool WCSouth3rd
network 172.20.138.0 255.255.254.0
default-router 172.20.138.1
domain-name butta.org
dns-server 172.20.45.122 172.20.45.121
!
ip dhcp pool Lab2nd
network 172.20.102.0 255.255.254.0
default-router 172.20.102.1
domain-name butta.org
dns-server 172.20.45.122 172.20.45.121
!
ip dhcp pool Radiology2nd
network 172.20.140.0 255.255.254.0
default-router 172.20.140.1
domain-name butta.org
dns-server 172.20.45.122 172.20.45.121
!
ip dhcp pool RadiationOncalogy2nd
network 172.20.116.0 255.255.254.0
default-router 172.20.116.1
domain-name butta.org
dns-server 172.20.45.122 172.20.45.121
!
ip dhcp pool Purchasing1st
network 172.20.124.0 255.255.254.0
default-router 172.20.124.1
domain-name butta.org
dns-server 172.20.45.122 172.20.45.121
!
ip dhcp pool Auditorium1st
network 172.20.114.0 255.255.254.0
default-router 172.20.114.1
domain-name butta.org
dns-server 172.20.45.122 172.20.45.121
!
ip dhcp pool GuestWireless
network 10.220.0.0 255.255.255.0
default-router 10.220.0.1
domain-name guest.net
dns-server 204.153.217.68 204.153.217.69
!
ip dhcp pool CORPDATA
network 172.21.0.0 255.255.0.0
default-router 172.21.1.1
dns-server 172.20.45.121 172.20.45.122
netbios-name-server 172.20.45.121 172.20.45.122
domain-name butta.org
!
ip dhcp pool ProfessionalBuilding1
network 172.20.122.0 255.255.254.0
default-router 172.20.122.1
domain-name butta.org
dns-server 172.20.45.122 172.20.45.121
!
ip dhcp pool PhysiciansAccess
network 10.220.10.0 255.255.255.0
dns-server 204.153.217.68 204.153.217.69
domain-name rmc-physician.local
default-router 10.220.10.1
!
!
!
!
port-channel load-balance src-dst-ip
no file verify auto
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
interface Port-channel1
description Connection to Nortel Passport 8010 Core
switchport access vlan 160
!
interface Port-channel2
description Connection to WLC #1
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 160,997-999
switchport mode trunk
!
interface Port-channel3
description Connection to WLC #2
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 160,997-999
switchport mode trunk
!
interface Port-channel4
description Connection to WLC# 3
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 160,997-999
switchport mode trunk
!
interface GigabitEthernet1/0/1
switchport access vlan 160
channel-group 1 mode on
!
interface GigabitEthernet1/0/2
description Connection to WLC #1
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 160,997-999
switchport mode trunk
channel-group 2 mode on
!
interface GigabitEthernet1/0/3
description Connection to WLC# 2
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 160,997-999
switchport mode trunk
channel-group 3 mode on
!
interface GigabitEthernet1/0/4
description Connection to WLC# 3
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 160,997-999
switchport mode trunk
channel-group 4 mode on
!
interface GigabitEthernet1/0/5
!
interface GigabitEthernet1/0/6
description Connection to WLC #1
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 160,997-999
switchport mode trunk
channel-group 2 mode on
!
interface GigabitEthernet1/0/7
description Connection to WLC# 2
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 160,997-999
switchport mode trunk
channel-group 3 mode on
!
interface GigabitEthernet1/0/8
description Connection to WLC# 3
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 160,997-999
switchport mode trunk
channel-group 4 mode on
!
interface GigabitEthernet1/0/9
!
interface GigabitEthernet1/0/10
!
interface GigabitEthernet1/0/11
!
interface GigabitEthernet1/0/12
switchport access vlan 160
channel-group 1 mode on
!
interface GigabitEthernet2/0/1
switchport access vlan 160
channel-group 1 mode on
!
interface GigabitEthernet2/0/2
description Connection to WLC #1
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 160,997-999
switchport mode trunk
channel-group 2 mode on
!
interface GigabitEthernet2/0/3
description Connection to WLC# 2
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 160,997-999
switchport mode trunk
channel-group 3 mode on
!
interface GigabitEthernet2/0/4
description Connection to WLC# 3
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 160,997-999
switchport mode trunk
channel-group 4 mode on
!
interface GigabitEthernet2/0/5
!
interface GigabitEthernet2/0/6
description Connection to WLC #1
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 160,997-999
switchport mode trunk
channel-group 2 mode on
!
interface GigabitEthernet2/0/7
description Connection to WLC# 2
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 160,997-999
switchport mode trunk
channel-group 3 mode on
!
interface GigabitEthernet2/0/8
description Connection to WLC# 3
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 160,997-999
switchport mode trunk
channel-group 4 mode on
!
interface GigabitEthernet2/0/9
!
interface GigabitEthernet2/0/10
!
interface GigabitEthernet2/0/11
!
interface GigabitEthernet2/0/12
switchport access vlan 160
channel-group 1 mode on
!
interface GigabitEthernet3/0/1
switchport trunk encapsulation dot1q
switchport trunk native vlan 160
switchport trunk allowed vlan 104,160
switchport mode trunk
!
interface GigabitEthernet3/0/2
switchport trunk encapsulation dot1q
switchport trunk native vlan 160
switchport trunk allowed vlan 106,160
switchport mode trunk
!
interface GigabitEthernet3/0/3
switchport trunk encapsulation dot1q
switchport trunk native vlan 160
switchport trunk allowed vlan 108,160
switchport mode trunk
!
interface GigabitEthernet3/0/4
switchport trunk encapsulation dot1q
switchport trunk native vlan 160
switchport trunk allowed vlan 114,160
switchport mode trunk
!
interface GigabitEthernet3/0/5
switchport trunk encapsulation dot1q
switchport trunk native vlan 160
switchport trunk allowed vlan 124,160
switchport mode trunk
!
interface GigabitEthernet3/0/6
description Professional Plaza
switchport trunk encapsulation dot1q
switchport trunk native vlan 160
switchport trunk allowed vlan 122,160
switchport mode trunk
!
interface GigabitEthernet3/0/7
switchport trunk encapsulation dot1q
switchport trunk native vlan 160
switchport trunk allowed vlan 140,160
switchport mode trunk
!
interface GigabitEthernet3/0/8
switchport trunk encapsulation dot1q
switchport trunk native vlan 160
switchport trunk allowed vlan 102,160
switchport mode trunk
!
interface GigabitEthernet3/0/9
switchport trunk encapsulation dot1q
switchport trunk native vlan 160
switchport trunk allowed vlan 138,160
switchport mode trunk
!
interface GigabitEthernet3/0/10
switchport trunk encapsulation dot1q
switchport trunk native vlan 160
switchport trunk allowed vlan 136,160
switchport mode trunk
!
interface GigabitEthernet3/0/11
switchport trunk encapsulation dot1q
switchport trunk native vlan 160
switchport trunk allowed vlan 118,160
switchport mode trunk
!
interface GigabitEthernet3/0/12
switchport trunk encapsulation dot1q
switchport trunk native vlan 160
switchport trunk allowed vlan 142,160
switchport mode trunk
!
interface Vlan1
no ip address
shutdown
!
interface Vlan102
ip address 172.10.102.1 255.255.254.0 secondary
ip address 172.20.102.1 255.255.254.0
!
interface Vlan104
ip address 172.10.104.1 255.255.254.0 secondary
ip address 172.20.104.1 255.255.254.0
!
interface Vlan106
ip address 172.10.106.1 255.255.254.0 secondary
ip address 172.20.106.1 255.255.254.0
!
interface Vlan108
ip address 172.10.108.1 255.255.254.0 secondary
ip address 172.20.108.1 255.255.254.0
!
interface Vlan114
ip address 172.20.114.1 255.255.254.0
!
interface Vlan118
ip address 172.10.118.1 255.255.254.0 secondary
ip address 172.20.118.1 255.255.254.0
!
interface Vlan122
ip address 172.10.122.1 255.255.254.0 secondary
ip address 172.20.122.1 255.255.254.0
!
interface Vlan124
ip address 172.10.124.1 255.255.254.0 secondary
ip address 172.20.124.1 255.255.254.0
!
interface Vlan136
ip address 172.10.136.1 255.255.254.0 secondary
ip address 172.20.136.1 255.255.254.0
!
interface Vlan138
ip address 172.10.138.1 255.255.254.0 secondary
ip address 172.20.138.1 255.255.254.0
!
interface Vlan140
ip address 172.10.140.1 255.255.254.0 secondary
ip address 172.20.140.1 255.255.254.0
!
interface Vlan142
ip address 172.20.142.1 255.255.254.0
!
interface Vlan160
ip address 172.20.160.2 255.255.254.0
!
interface Vlan997
ip address 10.220.10.1 255.255.255.0
!
interface Vlan998
ip address 172.21.1.1 255.255.0.0
!
interface Vlan999
ip address 10.220.0.1 255.255.255.0
ip access-group GuestWireless in
!
ip classless
ip route 0.0.0.0 0.0.0.0 172.20.160.1
ip http server
!
ip access-list extended GuestWireless
deny udp any 10.0.0.0 0.255.255.255 eq domain
deny udp any 172.16.0.0 0.15.255.255 eq domain
deny udp any 192.168.0.0 0.0.255.255 eq domain
permit udp any any eq domain
permit udp any any eq bootpc
permit udp any host 10.220.0.1 eq bootps
deny ip any 10.0.0.0 0.255.255.255
deny ip any 192.168.0.0 0.0.255.255
deny ip any 172.16.0.0 0.15.255.255
permit ip any any
ip access-list extended Physicians
deny udp any 10.0.0.0 0.255.255.255 eq domain
deny udp any 172.16.0.0 0.15.255.255 eq domain
deny udp any 192.168.0.0 0.0.255.255 eq domain
permit udp any any eq domain
permit udp any any eq bootpc
permit udp any host 10.220.10.1 eq bootps
deny ip any 10.0.0.0 0.255.255.255
deny ip any 192.168.0.0 0.0.255.255
deny ip any 172.16.0.0 0.15.255.255
permit ip any any
!
tftp-server 172.20.23.110
!
control-plane
!
!
line con 0
logging synchronous
line vty 0 4
password
logging synchronous
login local
length 0
line vty 5
password
login local
line vty 6 15
password
login
!
ntp server 172.20.44.18 key 0 prefer
end
Answer : access list on core switch for restricted guest access
Ok so here goes. First of all there is no acl being applied on vlan 997 so I will deal only with 999
interface Vlan999
ip address 10.220.0.1 255.255.255.0
ip access-group GuestWireless in
!
ip access-list extended GuestWireless
deny udp any 10.0.0.0 0.255.255.255 eq domain
deny udp any 172.16.0.0 0.15.255.255 eq domain
deny udp any 192.168.0.0 0.0.255.255 eq domain
permit udp any any eq domain
permit udp any any eq bootpc
permit udp any host 10.220.0.1 eq bootps
deny ip any 10.0.0.0 0.255.255.255
deny ip any 192.168.0.0 0.0.255.255
deny ip any 172.16.0.0 0.15.255.255
permit ip any any
so the basics of each command is permit / deny and either tcp/udp/ip then the source ip address/network followed by the destination ip address/network and then possibly the specific tcp/udp port.
so if we look at the first line:
deny udp any 10.0.0.0 0.255.255.255 eq domain
We will deny any source ip address that is destined for the 10.x.x.x network using udp port 53 (dns lookups)
You also need to keep in mind how the access-list is applied.. in or out. your acl is applied inbound, meaning traffic heading into the interface vlan 999. So this would be traffic that was generated on that vlan heading into the layer vlan 999 in order to get out somewhere else...
So your second line does the same thing, except blocks anything from getting to the 172.16.x.x networks and the 3rd line the same thing except blocks the 192.168.x.x networks. Then after that we let you do dns queries to anything.
The order of the acl is important. The first line we match is the action we will take. So first we block traffic from doing dns queries to our internal network then we allow all other dns queries to work so this is most likely to an external dns server on the internet.
Then we allow bootp which is basically allowing dhcp to function.
Then we block any traffic coming in to the layer 3 interface of vlan 999 from reaching the same 3 networks that were blocked previously on anything using IP.
Then we allow it to get to everything else.
So basically the flow is block what we don't want then open up what else remains, which should be anything on the internet.
I hope that helps.
Random Solutions
If, Then, Warning Message...?
Object Expected Error
SQL Query for report
Raise domain function level when there are 2 ADs
Checking for Negative Numbers not Working
How to use Hyper V in Server Core
TSQL- Arithmetic overflow error converting float to data type numeric.
how to add a column checkbox to Telerik RadGrid to select/deselect all the checkboxes from each item?
Win 7 - Need to uninstall assembly file manually. Access Denied
VBA to name an Access Table after a Form Control