- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
MX Deny inter-VLAN routing
Good Day,
Looking for a recommendation to deny inter-vlan routing on the MX using Layer 3 firewall rules. In this case I created a rule denying all RFC1918 subnets in source and destination, and put that above the default allow rule.
This way outbound to the internet is not bothered, and I can create specific allow rules to permit some inter-vlan routing where applicable.
Seemed to be working okay so far in testing, however I did notice some ICMP response not founds in a packet capture when ping testing two hosts in the same VLAN. I'd think that if they are in the same VLAN, the layer 3 rules would not apply, so I am troubleshooting the MX as a bug and changed firmware version to the latest patch.
Waiting to confirm if this resolved the issue, but can you sanity check me here?
Solved! Go to solution.
- Labels:
-
Firewall
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yes by default you can never ping a windows host. Usually in a test scenario I don't even bother with creating explicit rules in a windows machine, I just temporarily disable the windows firewall to be sure the network itself shows as being working as intended.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Sorry for the question, but why block ICMP between VLANs? Another question is, is the MX the network gateway? Because if it is not, in this case communication between hosts in the same VLAN will not pass through the firewall.
Otherwise, I'd suggest calling Meraki support to ensure this isn't a bug or it is indeed something that is intended by design.
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi alemabrahao, the requirement is to block all traffic between the VLANs, not just ICMP. I'm only using ping to do some basic testing in the rules.
MX is the gateway. I'm going to recreate the rules in my lab MX to see if the result is the same.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I see, in this case I suggest calling Meraki support.
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I don't understand : Seemed to be working okay so far in testing, however I did notice some ICMP response not founds in a packet capture when ping testing two hosts in the same VLAN. I'd think that if they are in the same VLAN, the layer 3 rules would not apply, so I am troubleshooting the MX as a bug and changed firmware version to the latest patch.
That's right. Intra-vlan will not be blocked by the L3 firewall. That is not a bug.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Ugh ? What ?
How is this a flaw ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I think you are mixing Intra-vlan and Inter-vlan
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Nope, I'm sure what I'm talking about. I have already carried out several laboratories and implementations in the past.
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yes, it is a flaw, in many cases communication between clients on the same network segment is not necessary. I repeat again, this is the basics expected of a decent firewall.
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Okay if you say so.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I wanted to respond the same. But I think hes saying that ping traffic is blocked between clients in the same vlan? ( Based on his packet capture) but its not clear if the ICMP response not found is even related to this. another thing missing here is if the clients are on different mx ports or 1 port trunked to a switch. I think there was bug at some point using different ports on a specific mx. But using a trunk to a switch and clients on that switch, traffic should not even traverse the mx.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The clients are on a L2 switch. The switch is trunked to the firewall. I am setting up a lab to replicate the MX environment now and we will see if I see the same result of traffic being blocked where it should not be. It could be a switching issue.
More to come.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
In this case I have to agree with @RaphaelL , they are on the same segment L2 will not block anyway. Hey I thought the hosts were directly connected to the MX. In this case, you might be able to solve it with L2 ACL.
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Or configure Private VLANs depending on the switch model.
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Exactly. Layer 2 communications ( intra-vlan ) can't be block by the Layer 3 firewall (inter-vlan ) of the MX.
There ways to achieve that ( client isolation on a switch ? ).
Client A on vlan 10 on switch 1 port 2 will reach Client B on vlan 10 on switch 1 port 3 without ever reaching the MX.
( I know you know that btw )
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I'm also gonna post the same answer as some of my colleagues did.
The reason why you are getting response not found in captures is probably because some of the ICMP echo's are reaching the MX which shouldn't normally since intra-VLAN traffic does not pass the firewall since hosts will directly communicate to each other based on their source and destination MAC addresses.
The only few reasons I can think is that the client is perhaps using the MAC address of the MX as destination erroneously instead of the endpoint. Or that the switch is flooding the frame to the MX also while the response is not being flooded. Or that your endpoints are both directly on the LAN ports of the MX.
You would need to check the capture itself and really look at the source and destination mac addresses being used while having the endpoints mac addresses to check.
It is also important to know that switched traffic on an MX will not be treated as "forwarding" traffic and will not be subject to the L3/4 rules. Only an MX in passthrough mode could have this but then you are using the WAN1 port and that traffic will be subject to the rules.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks GldenJoe, the only issue I see with all this right now is I exported the, VLANs, Subnets, policy objects and the L3 rules and ported them over to a lab MX that I have setup to simulate the environment and all testing passed as expected.
Intra-VLAN traffic were permitted worked as expected.
Inter-VLAN traffic where permitted worked as expected.
Traffic not specified explicitly to be allowed was not allowed.
Internet bound traffic worked just fine.
However on the staged equipment where we noticed the issue, test hosts cannot ping each-other within the same VLAN, or in different VLANs that are explicitly permitted.
Changing firmware to the latest patch changed nothing.
Moving the hosts from the switches directly onto the MX changed nothing.
So I built SVIs on Stack 1 and Stack 2 to do ping testing to rule out the hosts themselves perhaps dropping the ping, and they work as expected.
At this point I am thinking this is a problem with some of these particular test laptops, but unsure otherwise.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yes by default you can never ping a windows host. Usually in a test scenario I don't even bother with creating explicit rules in a windows machine, I just temporarily disable the windows firewall to be sure the network itself shows as being working as intended.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Same, but without access to them I needed to actually prove that was the issue. Just to update you all, this was related to windows firewall.
