i have 2x 27 subet ( we will call first /27 fip and call second /27 sip) we assign sip subnet to our virtual machine and we do not want assign ip from sip to our physical node and we wan assign ip from fip subnet to our physical server, because we want sip can not spoof physical server ips, so when we create vlan in our switch we set port 1 and fip and sip subnet access to this vlan in this senario can my virtual machine spoof our physical node ip ?
some one in my datacenter technical team told me we should create vlan for fip and create a seprate vlan for sip then set vlan fip and vlan sip access to switch port #1 is it right? if it is ok can some one give me the commands for this senario which create 2 spetare vlan and access them to port siwtch #1 for exaple?
i want for example 192.168.1.0/27 and 192.168.1.32/27 access port switch #1 , in my physical server i set 192.168.1.2 and assign 192.168.1.32/27 to my virtual machine which hsoted in this physical server now there is a danger for me here and this is my vm users can set ip from 192.168.1.0/27 for their network adapter because both ip range access port switch #1 if my vm users set ip rom 192.168.1.32/27 range for their network adapter there is no problem but i do not want my vm users can set ip from 192.168.1.0/27 range to their network adapter because i will assign 192.168.1.0/27 to more than 15 physical sever and it may cause ip confilict,
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...