Hi, we are going to offer dedicated servers to our customers, they will have root access. We want to prevent a customer from being able to configure any IP from our network on their server.
I guess we will have to create an ACL rule on each port of the switch authorizing only the client IPs.
What I have not found is to create a negative condition, example:
If the IP is not “the authorized one” action DROP.
This option is not available in switch ACL.
That’s why I open this post
Maybe there is some other way to do what I need?
I think is a very basic function for a switch…
Well, switch ACL does not exist, it is switch rule. It is not really intended for access control, but to redirect traffic in a different direction than it would normally flow. E.g. to send only some of the traffic, that is normally switched, to the CPU.
I guess you could work around it by having rules that redirect the traffic you want to handle to one port, and finally redirect all other traffic (IP 0.0.0.0/0) to another port where nothing is connected. Or to the CPU, where it can be logged for example.
In a higher-end device (you do not mention the device type) it should be possible to do some things in bridge filters, but you need to check at what point it will drop the HW Offload as you probably do not want that to happen.
I don’t know what your exact configuration is…
What i would do is set the ARP to reply-only either on the Bridge or VLAN interface used, depending on the configuration and then set to the DHCP the add-arp-for-leases=yes parameter or static-only and manually enter the arp entry…
I already suggested that in reply #4, but AFAIK there is no action to drop/accept in a switch rule, only to send the traffic to a specified port or the CPU.
But that may be different on the device that you have.
Anyway, when you can spare a port you can still use that method, or you can redirect unmatched traffic to the CPU and see what is happening.
For educational purposes it would be great if you spelled out all the relevant properties, also those which keep default values in your particular case. E.g.:
The first two rules is to allow source and destination for the customer IP on the interface ether2, and the last rule is to drop anything else on the port. But as soon as the last rule is active all traffic gets dropped. Why can’t I get it to work?