03-03-2016 04:05 AM
I have an urgent issue with the SG300-52 switch:
- I have a connection on IP 172.16.0.64, Subnet 255.255.255.244 - this is on the VLAN1,
- And a connection on IP 172.16.0.128, Subnet 255.255.255.244 - this is on the VLAN2,
- And I have set the switch to Layer 3.
How could I set a connection between PC1 in VLAN1 and other PC2 in VLAN2 over Teamviewer ? without any others traffic like sharing folders.
Thanks,,
Shedid
03-03-2016 08:39 AM
Do you mean 255.255.255.224 ? Teamviewer should be worked if both subnet able to access the internet.
03-03-2016 10:01 AM
Thanks bobhtut1 for your interesting,
But Teamviewer is working over network without internet.
I just set Incoming LAN connections to accept from Extras -> Options ->Generals -> Network settings.
All I want is close all traffic between two different PCs on two VLANs except Teamviewer.
Thanks,,
03-03-2016 12:34 PM
A defined access-list will help (across VLANs) allowing teamviewer ports (http or https?) and preventing all other traffic.
03-09-2016 06:12 PM
PS: Why are you using Teamviewer to remote access your LAN? If those are windows devices, then use remote desktop connection, it's less complicated than setting up TeamViewer
Anyway, you should create an access list in the following order
ACL1:
Source: Any
Desti: Any
Allowed Ports: 5938/TCP
Action: Permit
ACL2:
Source: Any
Desti: Any
Allowed Ports:
Action: Deny
NOTE:
1. ACL2 is optional due to implicit deny, the purpose of ACL2 is just to monitor the hits :)
2. See Teamviewer docs regarding the port: LINK
03-10-2016 10:16 AM
Dear LJ Gabrillo
You are right about remote desktop connection !! :)
Can I use same both ACL in remote desktop connection.
Because I have test it like below, but can't connect between hosts :(
ACL1:
Source: Any
Desti: Any
Allowed Protocol: RDP
Action: Permit
ACL2:
Source: Any
Desti: Any
Allowed Ports:
Action: Deny
Thanks,,
03-10-2016 05:02 PM
What interface did you apply the settings?
Also, it's
ACL1:
Source: Any
Desti: Any
Source Port: Any
Destination Port: Windows RDP(3389/TCP and 3389/UDP)
Action: Permit
ACL2:
Source: Any
Desti: Any
Protocol/s(Source & Desti): Any
Action: Deny
Try to check your ACL hits as well, make sure to use extended ACL
03-13-2016 07:07 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide