Comments on: Traffic Filters and ACLs for the Ethernet Routing Switch 5000 https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/ technology, networking, virtualization and IP telephony Tue, 14 May 2019 07:45:18 +0000 hourly 1 https://wordpress.org/?v=6.7.2 By: Shivam Mishra https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-139685 Tue, 14 May 2019 07:45:18 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-139685 In reply to Andrey Zverev.

I have ERS 4550T if I want to apply an ACL such that only subnet 172.22.23.0/24,172.22.24.0/24 and 172.22.25.0/24 able to communicate with 172.27.64.155 and 172.27.64.156 and rest traffic should get blocked .Please let me know to implement this below mentioned configuration are correct or not.

qos ip-acl name allow src-ip 172.22.23.0/24 dst-ip 172.27.64.155/32 drop-action disable
qos ip-acl name allow src-ip 172.22.24.0/24 dst-ip 172.27.64.155/32 drop-action disable
qos ip-acl name allow src-ip 172.22.25.0/24 dst-ip 172.27.64.155/32 drop-action disable
qos ip-acl name allow src-ip 172.22.23.0/24 dst-ip 172.27.64.156/32 drop-action disable
qos ip-acl name allow src-ip 172.22.24.0/24 dst-ip 172.27.64.156/32 drop-action disable
qos ip-acl name allow src-ip 172.22.25.0/24 dst-ip 172.27.64.156/32 drop-action disable

]]>
By: Andrey Zverev https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-34486 Tue, 06 May 2014 09:59:06 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-34486 Hi Michael,
at first thank you for your blog, it’s really helped me scores of times.
And my question:
have you ever config an Avaya VSP 7000 switch? Is ACL configuration like this working on Avaya VSP 7000 ? I looked for some information about Traffic Filters and ACLs for the Avaya VSP 7000. There is no any word about it in VSP7000_10_3_Doc_Collection_04_20140402.zip (I have just doc collection, not device to test unfortunately) Meanwhile i tested ACL configuration from this page on my ERS 4524GT with SW:v5.7.0.008 and it works fine. And it will be really strange that it works on ERS 4500 and doesn’t work on VSP 7000.

]]>
By: Michael McNamara https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-22981 Tue, 22 Apr 2014 22:33:26 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-22981 In reply to Ekram.

Thanks for sharing the solution!

]]>
By: Ekram https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-22773 Tue, 15 Apr 2014 04:06:29 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-22773 In reply to Michael McNamara.

Thanks Michael, I got the solution…..we need to split UDP port range into multiple ranges:

Port Range Functionality:
The Ethernet Routing Switch 5500 has the ability to specify a range of values supported by the QoS data model for several classification components (e.g., Layer 4 source and destination port numbers, VLAN Id values). Range support is limited to a certain extent, however, because ranges are represented as a bitmask within the overall classification mask, and not with explicit minimum and maximum values. A range must thus be specified by indicating which bits in the given field (e.g., Layer 4 source port) are „ignored‟ (i.e., set to 0). Taking into account this limitation, the following rules are used to determine valid range values:
I. Minimum value: n
Maximum value: n
>> Example: min: 20 max: 20 (min = max equates to a range of 1)
II. Minimum value: 0
Maximum value: (2^n) – 1
>> Example: min: 0 max: 63 (n = 6)
III. Minimum value: even number
Maximum value: minimum port number in binary with rightmost consecutive 0‟s replaced with 1‟s using the formula: Port Maximum = ((Port minimum + 2n) -1)) where n equal number of consecutive trailing zero‟s.
>> Example: min: 128 max: 255 ((128 + 27) – 1 = 255; 128 in binary has 7 consecutive trailing zero‟s)
Specified ranges that do not adhere to one of these three rules cannot be supported and will be flagged as erroneous.

]]>
By: Michael McNamara https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-22676 Fri, 04 Apr 2014 17:42:36 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-22676 In reply to Ekram.

Hi Ekram,

I would guess it’s a bug or limitation of the hardware. I would suggest you contact Avaya if you need to know the precise reason.

Cheers!

]]>
By: Ekram https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-22648 Mon, 31 Mar 2014 08:14:09 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-22648 Hi Michael, Hope you are doing good!!!

I am trying to configure QoS based on UDP ports on ERS 5520 SW v6.3.1 using below given command, but its throwing error:
“qos traffic-profile classifier name Test protocol 17 dst-port-min 54600 dst-port-max 54699 update-dscp 46 update-1p 6 block one eval-order 20 committed-rate 10000 committed-burst-size 4 drop-out-action disable update-dscp-out-action 16”

Error: Specified Destination Layer 4 min/max range not supported

Same command is working fine on ERS 4500…..could you please suggest?

]]>
By: Rajesh Bisht https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-17199 Fri, 31 May 2013 10:31:08 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-17199 Hi Michael,

do you have any post on inter-VLAN communication restriction in ERS 8800. I want to block all communication between differnt VLANs apart from the server VLAN.

I am new to Nortel/Avaya. I have worked all my life on Cisco & it is pretty easy in Cisco. But, in Nortel, it seems to be too confusing. I tried going through QoS & IP filtering on ERS 8800, but not able to understand much.

if you have any post/blog on that, it will help.

Regards

Rajesh

]]>
By: JM https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-7379 Mon, 01 Oct 2012 07:34:26 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-7379 In reply to Jeff.

I have the same problem! There’s no Issues?

]]>
By: Michael McNamara https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-6707 Tue, 12 Jun 2012 01:52:53 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-6707 In reply to Nick.

You can use an Access Policy on the ERS 8600/8800 series switches.

]]>
By: Nick https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-6692 Thu, 07 Jun 2012 14:03:42 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-6692 Is there any way to restrict just SNMP and allow everything else?
We have some staff that kick off SNMP scanners which I would like to block.

Thanks

]]>
By: Jeff https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-5056 Tue, 18 Oct 2011 20:44:43 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-5056 Wondering if anyone has been able to get this working. I am having the same issue as drunkard. I have the IP ACL’s in place and they work for about 5 minutes then all traffic is blocked. I am locking down a port on a 5510 so the printer is only permitted to send and receive traffic from two different host addresses. I loaded wireshark on one of the hosts and ran a continuous ping, and the system tries to arp for the mac address of the printer, at this point all traffic stops. I tried the L2 ethertype ACL mentioned above with no success. I am running version 614011s code on teh switch.

qos ip-acl name hurcoll4250 src-ip 192.168.53.1/32 dst-ip 192.168.52.5/32
qos ip-acl name hurcoll4250 src-ip 192.168.53.1/32 dst-ip 192.168.52.4/32
qos ip-acl name hurcoll4250 src-ip 192.168.53.1/32 dst-ip 192.168.2.88/32
qos ip-acl name hurcoll4250 src-ip 192.168.52.5/32 dst-ip 192.168.53.1/32
qos ip-acl name hurcoll4250 src-ip 192.168.52.4/32 dst-ip 192.168.53.1/32
qos ip-acl name hurcoll4250 src-ip 192.168.2.88/32 dst-ip 192.168.53.1/32

qos ip-acl name hurcoll4250 drop-action enable

qos acl-assign port 40 acl-type ip name hurcoll4250

]]>
By: Alex https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-4813 Wed, 14 Sep 2011 14:40:01 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-4813 In reply to Alex.

Sorry my previous post is wrong.
I messed up in my test, it’s still not working as expected…

]]>
By: Alex https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-4812 Wed, 14 Sep 2011 13:21:25 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-4812 In reply to Drunkard.

Drunkard,

I had the same problem.
Try adding an L2-ACL in which you specify the arp ethertype (0x0806)

qos l2-acl name “monL2” ethertype 0x0806 drop-action disable
qos l2-acl name “monL2″ drop-action disable

even the L2 ethertype “ignore” doesn’t take arp into account…

It worked for me.

]]>
By: Drunkard https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-4778 Wed, 07 Sep 2011 02:26:10 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-4778 In reply to Michael McNamara.

Hi Michael,

I add L2-ACL:
qos l2-acl name “monL2” drop-action disable
qos acl-assign port 3 acl-type l2 name “monL2”
but it didn’t help :(

Best regards.

]]>
By: Michael McNamara https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-4752 Thu, 01 Sep 2011 00:22:47 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-4752 In reply to Drunkard.

Hi Drunkard,

It appears you are right… the IP-ACL will only permit IP traffic (Ethertype 0x0800) and blocks ARP (Ethertype 0x0806). I’m not sure if you can attach a L2-ACL to allow ARP. I’m very busy these days but if I have time I’ll try to test it out myself.

Cheers!

]]>
By: Drunkard https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-4736 Sat, 27 Aug 2011 04:23:28 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-4736 Hi Michael,

ARP Inspection is disabled. NO – my configuration isn’t a factory default configuration … but I don’t configured ARP on the switch! Without a ip-acl: ARP and DHCP working well.
And after: qos acl-assign port 3 acl-type ip name “mon”
stop working, even if a ACL have one rule permit all trafic.

]]>
By: Michael McNamara https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-4727 Fri, 26 Aug 2011 14:22:36 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-4727 In reply to Drunkard.

Hi Drunkard,

Those ACLs should only examine IP packets, do you have Dynamic ARP Inspection enabled? Are you testing this from a factory default configuration?

Cheers!

]]>
By: Drunkard https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-4718 Fri, 26 Aug 2011 09:28:43 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-4718 Hi Michael,

I tried a ip-acl on Nortel 5510:
qos ip-acl name “mon” src-ip 172.16.2.1/32 protocol 6 src-port-min 80 src-port-max 80
qos ip-acl name “mon” src-ip 172.16.2.1/32 protocol 6 src-port-min 3389 src-port-max 3389
qos ip-acl name “mon” drop-action enable set-drop-prec low-drop
qos acl-assign port 3 acl-type ip name “mon”

After it – the PC (172.16.2.1) can’t get a answer for arp-request, and as a result – no traffic …
If add a static ARP record on the PC – all is work and the ip-acl too.

How I can grant a permit for ARP, HDCP and etc. traffic?

Best regards,
Konstantin.

]]>
By: Michael McNamara https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-4642 Fri, 05 Aug 2011 03:49:19 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-4642 In reply to Tim.

Hi Tim,

You’re probably not running the latest and greatest software release. I believe I did that lab running 6.1.x software.

Good Luck!

]]>
By: charles https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-4611 Sun, 31 Jul 2011 07:33:02 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-4611 the infofmation on the blogs r just 100% precise and very very allow to to say vey again clear thanx for the solutions you provide

Charles Milanya
Nairobi
kenya.

]]>
By: Tim https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-4594 Thu, 28 Jul 2011 09:35:50 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-4594 Hi Michael,
I’m an ex-Nortel-er – your site is great. I am having some issues configuring my ERS 5520 – I’m trying to create a DMZ and need to create an ACL/filter to block hosts on the DMZ segment from contacting the ‘secure’ segment. The NT documentation seems to indicate that I should be able to create an ip-element filtering on TCP flags (e.g. just ‘SYN’) but when I go to do this on my switch, the tcp-control option isn’t there. Any suggestions? I keep reading the documentation but don’t find anything. Could I just create a system element with the byte pattern I’m looking for?
Best regards,
Tim

]]>
By: Michael McNamara https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-4439 Mon, 27 Jun 2011 02:33:36 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-4439 In reply to Rhys.

Hi Rhys,

I believe the drop needs to be the last statement in your ACL. If you want to allow other traffic through the filter you need to create a rule in the ACL before your last statement allow that specific traffic.

Cheers!

]]>
By: Rhys https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-4426 Thu, 23 Jun 2011 11:02:36 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-4426 Hi,

I am having trouble with ACL’s on the ERS 5000 series switches. I have the following configuration:

qos ip-acl name test src-ip 10.0.0.5/32 dst-ip 10.0.0.100/32 protocol 6 dst-port-min 22 dst-port-max 22 drop action disable

qos ip-acl name test src-ip 10.0.0.5/32 dst-ip 10.0.0.100/32 protocol 17 dst-port-min 161 dst-port-max 161 drop action disable

qos ip-acl name test dst-ip 10.0.0.100/32 drop-action enable

qos ip-acl name test drop-action disable

The above is applied to several ports.

The access list is supposed to allow SSH and SNMP to the switch from a specified range (rules one and two) block any other access to the switch (rule three) and allow any other device to communicate with anything (rule four).
Rules 1-3 seem to work; I can SSH and SNMP to the switch from the specified IP range with no problems, ICMP and telnet are blocked.

I can then contact some devices on the subnet (.20) but not others (.201 and .202)

I have also tried applying rule four using 0.0.0.0/0 as the src and dst but this gives the same result.

Any help would be greatly appreciated

Thanks,

Rhys.

]]>
By: Michael McNamara https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-4409 Mon, 20 Jun 2011 03:29:40 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-4409 In reply to jitendra.

Hi jitendra,

I’m not quite sure I understand… how is the ACL working fine if it’s disrupting communications to/from noes in that VLAN?

Good Luck!

]]>
By: jitendra https://blog.michaelfmcnamara.com/2010/07/traffic-filters-and-acls-for-the-ethernet-routing-switch-5000/comment-page-1/#comment-4399 Thu, 16 Jun 2011 07:51:18 +0000 http://blog.michaelfmcnamara.com/?p=1483#comment-4399 Hello
When i have applied ACL on ports that is in same VLAN, acl works fine but nodes in that vlan stops communicating.

]]>