cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
595
Views
0
Helpful
3
Replies

Intervlan traffic filtering

gamage123
Level 1
Level 1

I have a 3750 switch with intervlan routing enabled. I have created 4 vlans as a,b,c & d. At the moment intervlan routing between all the vlans is possible. But for security reason I DO NOT want vlan c & d to communicate with vlan a & b. I want vlan a to communicate only with vlan b and vlan b to communicate only with vlan a.

Please help me to do this

2 Accepted Solutions

Accepted Solutions

padramas
Cisco Employee
Cisco Employee

Hello Prasanga,

You configure ACLs to isolate the traffic.

the following link will guide you in implementing it

http://www.cisco.com/en/US/docs/switches/lan/catalyst3750/software/release/12.2_44_se/configuration/guide/swacl.html

HTH

Padmanabhan

View solution in original post

Jon Marshall
Hall of Fame
Hall of Fame

Prasanga

As an example

a = 192.168.5.0/24

b = 192.168.6.0/24

c = 192.168.7.0/24

d = 192.168.8.0/24

access-list 101 deny ip 192.168.7.0 0.0.0.255 192.168.5.0 0.0.0.255

access-list 101 deny ip 192.168.7.0 0.0.0.255 192.168.6.0 0.0.0.255

access-list 101 permit ip any any

int vlan c

ip access-group 101 in

access-list 102 deny ip 192.168.8.0 0.0.0.255 192.168.5.0 0.0.0.255

access-list 102 deny ip 192.168.8.0 0.0.0.255 192.168.6.0 0.0.0.255

access-list 102 permit ip any any

int vlan d

ip access-group 102 in

Jon

View solution in original post

3 Replies 3

padramas
Cisco Employee
Cisco Employee

Hello Prasanga,

You configure ACLs to isolate the traffic.

the following link will guide you in implementing it

http://www.cisco.com/en/US/docs/switches/lan/catalyst3750/software/release/12.2_44_se/configuration/guide/swacl.html

HTH

Padmanabhan

Jon Marshall
Hall of Fame
Hall of Fame

Prasanga

As an example

a = 192.168.5.0/24

b = 192.168.6.0/24

c = 192.168.7.0/24

d = 192.168.8.0/24

access-list 101 deny ip 192.168.7.0 0.0.0.255 192.168.5.0 0.0.0.255

access-list 101 deny ip 192.168.7.0 0.0.0.255 192.168.6.0 0.0.0.255

access-list 101 permit ip any any

int vlan c

ip access-group 101 in

access-list 102 deny ip 192.168.8.0 0.0.0.255 192.168.5.0 0.0.0.255

access-list 102 deny ip 192.168.8.0 0.0.0.255 192.168.6.0 0.0.0.255

access-list 102 permit ip any any

int vlan d

ip access-group 102 in

Jon

Thanks a lot.

It works

Review Cisco Networking products for a $25 gift card