01-21-2013 02:51 PM
I have a SG300-28P that is our Main VLAN Switch. Though the VLANs that I have on it are there mostly because of our Edge Router and our
AP541Ns.
We have the Following VLANs defined (Subnets Changed to conseal Piblic IPs)
VLAN | Subnet | Use |
---|---|---|
VLAN200 | 200.200.200.0/24 | Class C Public IP Block, Maps to internal Resources, Internal Accessibla on AP521N for Testing On Internal Pub IP |
VLAN201 | 201.201.201.0/24 | Class C Public IP Block, Maps to internal Resources, NAT For Internal to External |
VLAN192 | 192.168.1.1/24 | Class C for AP521N for Customer Use |
VLAN101 | 10.1.0.0/16 | Class B for Internal LAN |
VLAN200 and VLAN201 come into Our Edge Router and out on a Single GE Port via VLAN Tagged to thje SG300.
The SG 300 Splits them out to Untagged Ports and they are connected to Two Firewalls, each with a IP in the 200 and 201 Subnets.
The AP510 has the VLAN200, VLAN192 and VLA101 tagged Subnets sent to it. The AP521 has three SSID, each associated with a Paticular VLAN.
This all works fine, though there are a few hidden flaws. Since all of the VLANs are present, both Internal and Public IPs, one could craft packets form one network and use the SG300 as its gateway to the other subnet and Gain Access.
How can I isolate the Subnets, so that
Thanks,
Scott<-
01-21-2013 04:06 PM
Hi Scott, two features I'd like you to be aware of. The first one is port security, which may be dynamic or static. Basically if you have expect MAC addresses connecting through the switch on a port, any deviation from the MAC address(es) connecting to the port can be discarded or the port shutdown.
The second feature is dynamic arp inspection (DAI). How this feature works is you can set trusted and untrusted interfaces. You then register IP and MAC addresses in to the switch. If a switch interface is "untrusted" a lookup will happen and if the lookup doesn't find the entry in the table, the host connection is blacklisted by the switch. If the interface is "trusted" nothing will happen.
These features of course cover rogue connections or unwanted devices within the LAN.
I do feel I am missing a piece of information for your inquiry. The reason I say this is because I don't know what functionality you need. If you do not put an IP address on the vlan interface, it is a layer 2 vlan. So you could simply remove the IP off the interface and that will end intervlan routing for a vlan unless your router gateway (router) will enable the intervlan routing. If the router handles the intervlan routing then you can either disable intervlan routes on the router or create an access list on the trunk links to filter the subnet traffic to the 10.x.x.x network on the switch. An ACL on the switch is INGRESS (inbound) only.
-Tom
Please mark answered for helpful posts
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide