RDP ACL
Hi, I have a case related to ACLs.
In my organization, I have configured multiple VLANs with different network addresses. For now, I’m focusing on two of them:
-
Default VLAN:
192.168.10.0/24
-
LocalLabComputer VLAN:
192.168.23.0/24
In the Default
VLAN, there is a server managing antivirus software, with the IP address 192.168.10.22
(for example).
Objective:
I want to block all traffic from the LocalLabComputer
network to the Default
network,
but still allow two-way communication between the antivirus server and the hosts in the LocalLabComputer
network.
I have configured 3 ACL rules (in order):
-
Rule 1:
-
Source: IP-Port Group
ST00
(the server) -
Destination:
Network: LocalLabComputer
-
Permit: TCP, UDP, ICMP, RDP
-
-
Rule 2:
-
Source:
Network: LocalLabComputer
-
Destination:
IP-Port Group: ST00
-
Permit: TCP, UDP, ICMP, RDP
-
-
Rule 3 (last one):
-
Source:
Network: LocalLabComputer
-
Destination:
Network: Default
-
Deny: All protocols
-
Problem:
-
From the
LocalLabComputer
network, RDP and port 4000 connections to theDefault
VLAN are still working — even though they should be blocked. -
But from the
Default
VLAN, RDP toLocalLabComputer
doesn't work — even though it should be allowed.
I'm wondering what I might have done wrong. Can someone point out where the mistake could be?
I forgot to add that these are rules made on Switch ACL