Solved

how to block traffic to a specific Avaya Port?

Posted on 2015-01-06
4
206 Views
Last Modified: 2015-01-26
Dear Experts,

I have two AL3500C06-E6 Avaya Switches in a stack mode, a NAS is connected to one of them and having a static IP address, how can I block specific traffic to this NAS?
the point is to block the clients connected to our wireless AP from accessing this NAS, so I know the two ports used for both the AP and the NAS.
I was told that I cant do that on Avaya switches (only cisco), I am not convinced and I would like to know your opinion.
0
Comment
Question by:moodi_ali
  • 2
  • 2
4 Comments
 
LVL 46

Expert Comment

by:Craig Beck
ID: 40533516
Depending on the model of switch you may be able to use the Private VLAN Edge feature, which would allow you to just stop anything coming from the AP to get to the NAS (and/or vice-versa).

If you want to do this at the IP level you may be stuck if the AP/clients and the NAS are on the same subnet, but you may be able to use layer-2 access-lists if the PVEdge feature isn't available.
0
 

Author Comment

by:moodi_ali
ID: 40534940
I have mentioned the switch model in the original post (AL3500C06-E6 Avaya) can I do the filtration / access list on the switch level without the need to create a VLAN( blocking all traffic from a specific port to another)?
0
 
LVL 46

Accepted Solution

by:
Craig Beck earned 500 total points
ID: 40535244
Avaya's documentation suggests that the 3549 does support layer-2 security, so yes, it should do MAC-level filtering.
0
 

Author Closing Comment

by:moodi_ali
ID: 40572114
bot really sure this would work.
0

Featured Post

Save the day with this special offer from ATEN!

Save 30% on the CV211 using promo code EXPERTS30 now through April 30th. The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

679 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question