Solved

how to block traffic to a specific Avaya Port?

Posted on 2015-01-06
4
201 Views
Last Modified: 2015-01-26
Dear Experts,

I have two AL3500C06-E6 Avaya Switches in a stack mode, a NAS is connected to one of them and having a static IP address, how can I block specific traffic to this NAS?
the point is to block the clients connected to our wireless AP from accessing this NAS, so I know the two ports used for both the AP and the NAS.
I was told that I cant do that on Avaya switches (only cisco), I am not convinced and I would like to know your opinion.
0
Comment
Question by:moodi_ali
  • 2
  • 2
4 Comments
 
LVL 45

Expert Comment

by:Craig Beck
ID: 40533516
Depending on the model of switch you may be able to use the Private VLAN Edge feature, which would allow you to just stop anything coming from the AP to get to the NAS (and/or vice-versa).

If you want to do this at the IP level you may be stuck if the AP/clients and the NAS are on the same subnet, but you may be able to use layer-2 access-lists if the PVEdge feature isn't available.
0
 

Author Comment

by:moodi_ali
ID: 40534940
I have mentioned the switch model in the original post (AL3500C06-E6 Avaya) can I do the filtration / access list on the switch level without the need to create a VLAN( blocking all traffic from a specific port to another)?
0
 
LVL 45

Accepted Solution

by:
Craig Beck earned 500 total points
ID: 40535244
Avaya's documentation suggests that the 3549 does support layer-2 security, so yes, it should do MAC-level filtering.
0
 

Author Closing Comment

by:moodi_ali
ID: 40572114
bot really sure this would work.
0

Featured Post

Give your grad a cloud of their own!

With up to 8TB of storage, give your favorite graduate their own personal cloud to centralize all their photos, videos and music in one safe place. They can save, sync and share all their stuff, and automatic photo backup helps free up space on their smartphone and tablet.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Read about achieving the basic levels of HRIS security in the workplace.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now