10-27-2019 05:48 AM
Hello World,
10-27-2019 07:37 AM
Hi @dagobert666
You can configure an ACL that allows only specific IPs or a specific range.
That ACL can be applied on the VTY lines, so only allowed users can access.
Regards
10-28-2019 05:19 PM
The original poster is correct that there is not a way to route for 3 of the vlans but not route for the fourth vlan. There are several alternatives to consider. If they are interested in controlling access to the switch for telnet or SSH it could be achieved by using access-class applied to the vty lines to specify an ACL which would restrict what IP addresses or subnets are permitted to access the switch. If other types of access are involved (perhaps SNMP or ping or something else) then an access list applied to all the interfaces could permit the appropriate addresses/subnets to access switch IP addresses, deny any other access to switch IP addresses, and permit other traffic.
HTH
Rick
10-28-2019 11:36 PM
Hi,
There is no direct way to exclude this Mgnt interface from the routing in the SG series switches but you can use the Access list for preventing allow HTTP/HTTPS/SSH/Telnet/SNMP access from any other VLAN. As you can apply access-list under the VTY, HTTP server, etc.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide