10-13-2023 02:14 AM
Hi Guys,
Good day! I have a question referencing the picture below.
How can I make a different vlan with a different gateway on each vlan that do not have inter-VLAN routing.
What I need to achieve are:
1. Different vlans and needs to be connected outside each via NAT.
2. No Intervlan routing needed.
Thank you and will be much appreciated your insights.
Solved! Go to Solution.
10-13-2023 02:48 AM
1. Different vlans and needs to be connected outside each via NAT.
This you can do standard NAT Setup to reach Internet since you have only 1 Internet connection
basic nat NAT config add more IP addres in ACL to work :
https://www.balajibandi.com/?p=1796
2. No Intervlan routing needed.
Since router aware of all the routing, you can use ACL on the interface not to connect other VLAN Address space
access-list 100 deny ip 192.168.10.0 0.0.0.255 192.168.20.0 0.0.0.255
access-list 100 permit ip any any
!
int vlan 10 or subinterface in the router.
ip access-group 100 in
10-13-2023 02:44 AM - edited 10-13-2023 02:55 AM
Hello @jib15
On this topology, Gw of each vlan should be hosted by the router..... then communication should be done beween VLAN...except if you implement ACL !
For NAT, perform a static NAT overload on interface serial 0/3/0:
ip nat inside source list 10 interface Serial0/30/ overload
-- configure standard ACL #10 matching he subnet 192.168.10.0/24:
access-list 10 permit 192.168.10.0 0.0.0.255
10-13-2023 03:27 AM
Hello M02@rt37,
Thank you for your response! this makes sense. I just forgot that we can use ACL to restrict the connection on each vlan as I had implemented the sub-interface on the router.
10-13-2023 03:38 AM
You're very welcome @jib15 !
10-13-2023 02:48 AM
1. Different vlans and needs to be connected outside each via NAT.
This you can do standard NAT Setup to reach Internet since you have only 1 Internet connection
basic nat NAT config add more IP addres in ACL to work :
https://www.balajibandi.com/?p=1796
2. No Intervlan routing needed.
Since router aware of all the routing, you can use ACL on the interface not to connect other VLAN Address space
access-list 100 deny ip 192.168.10.0 0.0.0.255 192.168.20.0 0.0.0.255
access-list 100 permit ip any any
!
int vlan 10 or subinterface in the router.
ip access-group 100 in
10-13-2023 03:19 AM
Hello @balaji.bandi,
This makes sense to me now! except this that makes me confused a bit on "int vlan 10 or subinterface in the router." I know the sub interface but how about the int vlan, do you mean possible to make as a gateway to vlan instead?
Btw, Thank you so much for your response! appreciated!
10-13-2023 04:12 AM
that is example
if you are using Router - you need to apply that ACL in the interface where the traffic leaving (that is the reason i mentioned "or")
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide