VLAN traffic on a simple layer3 cisco switch

I have a small business switch, SF300 series from Cisco, and I would like to set it up with 2 VLANs that should have no interaction.  I will treat them as if they were 2 physically separate switches.  There will be a few PCs and servers on each VLAN and each will connect to its own router/firewall.  By default the layer3 switch wants to route all IP traffic between the 2 VLANs, what is the most straightforward way to stop all interVLAN traffic?  Thanks.
SIDESHOWBLAHAsked:
Who is Participating?
 
AkinsdConnect With a Mentor Network AdministratorCommented:
The access lists are applied to the interface. You then create allow or deny subsets you want to permit or deny on the interface
0
 
AkinsdNetwork AdministratorCommented:
Use access lists
0
 
SIDESHOWBLAHAuthor Commented:
That was my best guess and I can see where to setup simple ACLs in the GUI, but cannot see how to assign them to a VLAN.  There is a binding option that looks like it is for assigning ACLs to ports.  Is that the best or only method?
0
Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

 
AkinsdNetwork AdministratorCommented:
Can you telnet into it or connect through the console?
0
 
SIDESHOWBLAHAuthor Commented:
Yes.  I even got into some limited CLI mode to assign IPs to the VLANs.
0
 
SIDESHOWBLAHAuthor Commented:
it seems that these small business devices do not support applying a access-list to a VLAN.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.