11-28-2014 05:25 AM - edited 03-07-2019 09:42 PM
I have a Catalyst 4507R as a core switch.
The Data center has more than 40 servers, but I need two of these 40 servers communicate only among themselves and with the remaining company networks.
Can you help me?
Regards
11-28-2014 05:36 AM
Hello Angelo,
you can use Private lan for your requirement .Please refer below document for more details.
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/54sg/configuration/guide/config/pvlans.html
Thanks,
VS.Suresh.
11-28-2014 06:01 AM
Disclaimer
The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
Liability Disclaimer
In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
Posting
So the two special servers need to NOT communicate with just the other 38 servers? If so, place in different subnet/VLAN from other servers and use ACL(s).
Or, if your equipment supports, place the two special servers within a PVLAN community separate from your other servers.
11-28-2014 06:06 AM
I think I use the solution with vlan acl:
create Vlan on 4500
vlan 98
name Server_Blocks
create Interfcaccia layer 3 on 4500
interface Vlan98
ip address 192.98.98.1 255.255.255.0
switch ports which are connected to the server
interface GigabitEthernet0/11
description Server_Block
switchport access vlan 98
switchport mode access
interface GigabitEthernet0/11
description Server_Block
switchport access vlan 98
switchport mode access
have suggestions for ACL?
allow traffic only
172.26.70.0/24
172.26.71.0/24
172.26.72.0/24
172.26.73.0/24
172.26.74.0/24
172.26.75.0/24
172.26.76.0/24
172.26.77.0/24
172.26.78.0/24
172.26.79.0/24
172.26.86.0/24
172.26.87.0/24
Thanks a lot for your support
11-28-2014 07:18 AM
this is my ACL:
access-list 101 permit ip any 172.26.98.0 0.0.0.255
access-list 101 deny ip 172.26.80.0 0.0.0.255 172.26.98.0 0.0.0.255
interface vlan98
ip access-group 101 in
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide