Imagine I have devices which muticasts and broadcasts tons of UDP traffic on a given network. Suggested solution is that I should put a router and let the device on the respective network (10.0.0.0/8) installed there. Note that the respective devices are hardcoded to use the 10.0.0.0/8 network. That way when the devices on the 10.0.0/8 broadcasts and multicast massive traffic, the router should block the whole unicast and brodcast traffic.
My question is this, if I connect the respective network devices which broadcast and unicast like crazy in on a Cat 3750 instead of a router, what type of feature or VLAN ACL should I use in order to contain such multicast and broadcast traffic and still allow communication between the devices on the Cat 3750 (10.0.0.8/24) with the corporate network? Is there any direct VLAN ACL I should use, or should I configure IP routing on the Cat 3750 in order to let it route from the 10.0.0.8/24 to the coporate_network? Sorry if this is a stupid question.
Let me complement this saying that I am obviously I am aware the switch would contain the broadcast traffic there.
Then if I want that VLAN-All-ports-on-Switch-3750 communicate with my internal network and do not forward any broadcast and unicast, all I would need to do is enabling IP routing and route to the corporate network. Is that right?
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...