On the router, I assume you have a "Plus" version of the IOS so that you can do LAN subinterfaces for the VLAN trunking.
If you do not create one of the logical VLAN interfaces, and that is the only router, then traffic on that VLAN will be completely isolated. If that is what you want, then this is the easy way to do it.
If you create both VLAN interfaces, with routing enabled, then you will need access control lists applied to the interfaces in order to keep the VLANs from talking to each other.
Extended IP access lists can be configured to let you block VLAN 100 from talking to VLAN 200 (or VLAN 200 from talking to VLAN 100), and permit each VLAN to communicate with the Internet. If that is what you want. They can pretty much control the flow of traffic however you want it to be.
Question We run asr9001 with XR 6.1.3, and we have a very long delay to
login w/ SSH 1 or 2 to the device compare to IOS device. After
investigation, the there is 1s delay between the client KEXDH_INIT and
the server (XR) KEXDH_REPLY. After debug ssh serv...
Introduction The purpose of this document is to demonstrate the Open
Shortest Path First (OSPF) behavior when the V-bit (Virtual-link bit) is
present in a non-backbone area. The V-bit is signaled in Type-1 LSA only
if the router is the endpoint of one or ...
Hi, I am seeing quite a few issues with patch install and wanted to
share my experience and workaround to this. Login to admin via CLI, then
access root with the “shell” command Issue “df –h” and you’ll probably
see the following directory full or nearly ...