I'm having an issue with an ACL on a VLAN interface. I've followed HP's documentation here: http://h20628.www2.hp.com/km-ext/kmcsdirect/emr_na-c02609963-3.pdf
I want to do the following:
VLAN 101 should only be able to communicate to VLAN 50 - no other VLANs, no internet access.
Initially, I tried the following access list:
ip access-list extended "SecureContent"
10 permit ip 192.168.50.0 0.0.0.255 192.168.101.0 0.0.0.255
20 remark "SecurityVLAN"
I applied this ACL to VLAN 101 "in" with the following command:
vlan 101
ip access-group "SecureContent" in
This configuration results in zero communication on that VLAN: The IP of 192.168.101.2 on port A1 cannot ping 192.168.101.1, the switch VLAN IP. If I change the access list to:
10 permit ip 192.168.101.1 0.0.0.255 192.168.101.1 0.0.0.255
20 permit ip 192.168.50.1 0.0.0.255 192.168.101.1 0.0.0.255
...this results in clients on the VLAN being able to ping their default gateway, but not the 50.1 gateway. That doesn't make any sense to me - the VLAN 101 IP interface should be considered logically "inside" that VLAN 101, correct?
I have tried various versions of this access list, even going so far as to do just a standard access list blocking a single IP yet permitting everything else with a "permit ip any any" statement - and this still results in zero inter or intra-vlan traffic - the host on that VLAN can't even ping its own gateway if I apply the list in the inbound direction (I also tried a variant in the outbound direction - exactly the same result!)
Below is the switch configuration:
Running configuration:
; J8697A Configuration Editor; Created on release #K.15.09.0012
; Ver #03:01.1f.ef:f2
hostname "HP-5406zl"
module 1 type j8702a
module 2 type j8708a
module 3 type j9546a
module 4 type j8708a
power-over-ethernet pre-std-detect
ip access-list extended "SecureContent"
10 permit ip 192.168.101.1 0.0.0.255 192.168.101.1 0.0.0.255
20 permit ip 192.168.50.1 0.0.0.255 192.168.101.1 0.0.0.255
exit
ip route 0.0.0.0 0.0.0.0 172.16.0.1
ip routing
snmp-server community "public" unrestricted
snmp-server contact "Person" location "Place"
vlan 1
name "DEFAULT_VLAN"
no untagged A1-A20,A23-A24,B1-B4,C1-C8,D1-D4
untagged A21-A22
ip address 192.168.1.10 255.255.255.0
jumbo
exit
vlan 50
name "Editors"
untagged A2-A19,B1-B3,C1-C8,D1-D4
tagged A23-A24
ip address 192.168.50.1 255.255.255.0
jumbo
exit
vlan 100
name "IO"
tagged A23-A24
ip address 192.168.100.1 255.255.255.0
exit
vlan 101
name "SecureContent"
untagged A1
ip address 192.168.101.1 255.255.255.0
ip access-group “SecureContent” in
exit
vlan 200
name "Corp"
tagged A23-A24
ip address 192.168.200.1 255.255.255.0
ip helper-address 192.168.50.2
exit
vlan 800
name "IT"
untagged A23-A24
ip address 172.17.0.1 255.255.255.0
exit
vlan 899
name "DMZ"
untagged B4
tagged A23-A24
ip address 172.18.0.1 255.255.255.0
jumbo
exit
vlan 900
name "Routed"
untagged A20
tagged A23-A24
ip address 172.16.0.2 255.255.255.252
exit
vlan 999
name "VLAN999"
no ip address
exit
EDITED to add relevant chassis information:
Software revision : K.15.09.0012 Base MAC Addr : 002561-f80000
ROM Version : K.15.30 Serial Number : XXXXXXXX
Allow V1 Modules : Yes
Opacity Shields : Not Installed
Thanks in advance for your help!