Access Lists
The usage of Access Lists on Extreme Networks switches is an efficient way to block network traffic. This can be broken down even to a single port. This example shows how to block SSH traffic from and to a device that is connected to port 1:44 of a switch. To accomplish this a policy definition has to be created:# edit policy nossh.polContents are:
@description "Policy to deny ssh"The policy itself is just self explaining. The editor is just like vi under Unix/Linux. After commiting the changes the policy gets automatically distributed among all members of the stack (if needed). To display the just created policy:
entry sshconnect {
if {
protocol tcp;
destination-port 22;
} then {
deny;
count denySSH;
}
}
* Slot-1 sw101.24 # sh policy "nossh"This policy is not connected right now. To apply it to port 1:44:
Policies at Policy Server:
Policy: nossh
@description "Policy to deny ssh"
entry sshconnect {
if match all {
protocol tcp ;
destination-port 22 ;
}
then {
deny ;
count denySSH;
}
}
Number of clients bound to policy: 0
Client: acl bound once
* Slot-1 sw101.22 # configure access-list nossh ports 1:44From now on all SSH connections from port 1:44 receive a time-out. When starting a SSH connection from a device connected to port 1:44 it can be seen on the switch:
done!
* Slot-1 sw101.24 # sh access-list counterTo reset the counters:
Policy Name Vlan Name Port Direction
Counter Name Packet Count Byte Count
==================================================================
nossh * 1:44 ingress
denySSH 10
* Slot-1 sw101.25 # clear access-list counterNow all counters are zeroed again.
* Slot-1 sw101.26 # sh access-list counterIt is important to mention that only one policy can be bound to a single port. Therefore it is necessary to think twice what the policy should do.
Policy Name Vlan Name Port Direction
Counter Name Packet Count Byte Count
==================================================================
nossh * 1:44 ingress
denySSH 0
To modify a connected policy edit it, disconnect the policy from the port and reconnect it to the port again.