The servers are on VLAN2 and the clients are on VLAN 3 and 4. I want communication between VLAN 2 and 3 and communication between VLAN 2 and 4, but NO access between VLAN 3 and 4. There is approx 500 clients each on VLAN 3 and 4 so manually configuring access-lists is not an option. Can I block the traffick at layer3?
I assume you're using a trunk interface on the router, one subinterface per VLAN, and that each VLAN is a different subnet. You can easily block at the subnet level rather than by individual IPs in this case. For example, you could apply an outbound ACL on the VLAN3 subinterface which blocks traffic to VLAN4's subnet, and permits everything else.
access-list 101 deny ip 10.0.1.0 0.0.0.255 10.0.2.0 0.0.0.255
Question We run asr9001 with XR 6.1.3, and we have a very long delay to
login w/ SSH 1 or 2 to the device compare to IOS device. After
investigation, the there is 1s delay between the client KEXDH_INIT and
the server (XR) KEXDH_REPLY. After debug ssh serv...
Introduction The purpose of this document is to demonstrate the Open
Shortest Path First (OSPF) behavior when the V-bit (Virtual-link bit) is
present in a non-backbone area. The V-bit is signaled in Type-1 LSA only
if the router is the endpoint of one or ...
Hi, I am seeing quite a few issues with patch install and wanted to
share my experience and workaround to this. Login to admin via CLI, then
access root with the “shell” command Issue “df –h” and you’ll probably
see the following directory full or nearly ...