Solved

how to block traffic to a specific Avaya Port?

Posted on 2015-01-06
4
214 Views
Last Modified: 2015-01-26
Dear Experts,

I have two AL3500C06-E6 Avaya Switches in a stack mode, a NAS is connected to one of them and having a static IP address, how can I block specific traffic to this NAS?
the point is to block the clients connected to our wireless AP from accessing this NAS, so I know the two ports used for both the AP and the NAS.
I was told that I cant do that on Avaya switches (only cisco), I am not convinced and I would like to know your opinion.
0
Comment
Question by:moodi_ali
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 46

Expert Comment

by:Craig Beck
ID: 40533516
Depending on the model of switch you may be able to use the Private VLAN Edge feature, which would allow you to just stop anything coming from the AP to get to the NAS (and/or vice-versa).

If you want to do this at the IP level you may be stuck if the AP/clients and the NAS are on the same subnet, but you may be able to use layer-2 access-lists if the PVEdge feature isn't available.
0
 

Author Comment

by:moodi_ali
ID: 40534940
I have mentioned the switch model in the original post (AL3500C06-E6 Avaya) can I do the filtration / access list on the switch level without the need to create a VLAN( blocking all traffic from a specific port to another)?
0
 
LVL 46

Accepted Solution

by:
Craig Beck earned 500 total points
ID: 40535244
Avaya's documentation suggests that the 3549 does support layer-2 security, so yes, it should do MAC-level filtering.
0
 

Author Closing Comment

by:moodi_ali
ID: 40572114
bot really sure this would work.
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question