In a scenario where I have a layer three switch configured with 50 VLANS and want to enable layer 3 switching/routing between only 5 VLANS. When I enable ip routing on the switch I enable routing between all VLANS, I don't want to administer multiple ACLS to restrict access, is there another way to stop traffic routing between specific VLANS?
I think you need to be more specific , do you have 50 layer 2 vlans or 50 layer 3 vlans currently . If they are layer 2 vlans then only create the layer 3 SVI's for the 5 you want to route between . If you already have 50 layer 3 SVI's defined then ACL's are your only option.
As other have said it's all down to whether or not you have created a Layer 3 interface on the switch.
If you create 50 vlans on the switch so that when you do a "show vlan" you see all 50 then these are layer 2 vlans only. You can enable ip routing and still there will be no routing between these vlans because they are only layer 2.
To route between vlans you need to create layer 3 interfaces for your vlans. eg.
You have a layer 2 vlan - vlan 20. To create a layer 3 interface (SV1) for it you would use the following commands
interface vlan 20
ip address x.x.x.x "subnet mask"
A "show ip interface brief" on the switch will show you which vlan interfaces you have created.
Only those vlans with L3 interfaces will be able to talk to each other. No layer 3 interface and clients within that vlan can only talk to clients within the same vlan.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...