Solved

VLAN traffic on a simple layer3 cisco switch

Posted on 2013-02-06
6
317 Views
Last Modified: 2013-02-28
I have a small business switch, SF300 series from Cisco, and I would like to set it up with 2 VLANs that should have no interaction.  I will treat them as if they were 2 physically separate switches.  There will be a few PCs and servers on each VLAN and each will connect to its own router/firewall.  By default the layer3 switch wants to route all IP traffic between the 2 VLANs, what is the most straightforward way to stop all interVLAN traffic?  Thanks.
0
Comment
Question by:SIDESHOWBLAH
  • 3
  • 3
6 Comments
 
LVL 18

Expert Comment

by:Akinsd
ID: 38861536
Use access lists
0
 

Author Comment

by:SIDESHOWBLAH
ID: 38861609
That was my best guess and I can see where to setup simple ACLs in the GUI, but cannot see how to assign them to a VLAN.  There is a binding option that looks like it is for assigning ACLs to ports.  Is that the best or only method?
0
 
LVL 18

Expert Comment

by:Akinsd
ID: 38861711
Can you telnet into it or connect through the console?
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:SIDESHOWBLAH
ID: 38861788
Yes.  I even got into some limited CLI mode to assign IPs to the VLANs.
0
 

Author Comment

by:SIDESHOWBLAH
ID: 38893223
it seems that these small business devices do not support applying a access-list to a VLAN.
0
 
LVL 18

Accepted Solution

by:
Akinsd earned 500 total points
ID: 38894019
The access lists are applied to the interface. You then create allow or deny subsets you want to permit or deny on the interface
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction This article explores the design of a cache system that can improve the performance of a web site or web application.  The assumption is that the web site has many more “read” operations than “write” operations (this is commonly the ca…
AWS has developed and created its highly available global infrastructure allowing users to deploy and manage their estates all across the world through the use of the following geographical components   RegionsAvailability ZonesEdge Locations  Wh…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now