10-12-2012 05:54 PM - edited 03-07-2019 09:26 AM
I have a SG-300-20 Managed switch. I attached a picture of what I want to do. Is this possible to do? How would I go about doing it?
Thanks
Solved! Go to Solution.
10-15-2012 06:52 AM
You can use port acl's to accomplish this although your model switch may or may not support this as I believe that is a lower end cisco switch. Check the documentation. . If you are dealing with a large amount of ports it becomes kind of pain implementing all those but realistically in your case in that drawing i would think you just need port acl's on the pc and server ports allowing access to each other , everything else is denied.
You can also apply ACLs to Layer 2 interfaces on a switch. Port ACLs are supported on physical interfaces and EtherChannel interfaces.
The following access lists are supported on Layer 2 interfaces:
•
Standard IP access lists using source addresses
•
Extended IP access lists using source and destination addresses and optional protocol type information
•
MAC extended access lists using source and destination MAC addresses and optional protocol type information
As with router ACLs, the switch examines ACLs associated with features configured on a given interface and permits or denies packet forwarding based on how the packet matches the entries in the ACL. In the example in Figure 37-1, if all workstations were in the same VLAN, ACLs applied at the Layer 2 input would allow Host A to access the Human Resources network, but prevent Host B from accessing the same network.
When you apply a port ACL to a trunk port, the ACL filters traffic on all VLANs present on the trunk port. When you apply a port ACL to a port with voice VLAN, the ACL filters traffic on both data and voice VLANs.
With port ACLs, you can filter IP traffic by using IP access lists and non-IP traffic by using MAC addresses. You can filter both IP and non-IP traffic on the same Layer 2 interface by applying both an IP access list and a MAC access list to the interface.

Note
You cannot apply more than one IP access list and one MAC access list to a Layer 2 interface. If an IP access list or MAC access list is already configured on a Layer 2 interface and you apply a new IP access list or MAC access list to the interface, the new ACL replaces the previously configured one.
10-13-2012 03:15 AM
Hi,
With my very limited knowledge , I think what you trying to do is very much possible.
Put each of these groups into seperate VLANs and configure Access list , configure Access group in interface VLANs and bind them according to your traffic requirement. But I am not sure if it 's possible in SMB Switches. I have a SMB SF300-24P in the infrastructure , I will check and get back to you on that !
10-13-2012 03:21 AM
I have just checked and there are ACL /ACE configurations available by which you can accomplish this
Please refer to this thread on the community which will sure help you in understanding how it's done.
https://supportforums.cisco.com/thread/2152247
Regards,
Anup
10-14-2012 02:12 AM
Hi,
all the devices seem to be in the same subnet?
In that case, Private VLAN feature might be a solution for you?
See
You need to check if supported by your switch, but according to
it seems so.
HTH,
Milan
10-14-2012 07:05 AM
Hey,
like I see the switch supports
PVE (also known as protected ports) provides Layer 2 isolation between devices in the same VLAN, supports multiple uplinks
maybe you should take a closer look at this features.
Otherwise the ideas above are also fine..you could also create 4 subnetworks and work with ACL. I'm not sure if the switch supports VACLs and you can work with only one VLAN.
regards,
Sebastian
10-15-2012 06:52 AM
You can use port acl's to accomplish this although your model switch may or may not support this as I believe that is a lower end cisco switch. Check the documentation. . If you are dealing with a large amount of ports it becomes kind of pain implementing all those but realistically in your case in that drawing i would think you just need port acl's on the pc and server ports allowing access to each other , everything else is denied.
You can also apply ACLs to Layer 2 interfaces on a switch. Port ACLs are supported on physical interfaces and EtherChannel interfaces.
The following access lists are supported on Layer 2 interfaces:
•
Standard IP access lists using source addresses
•
Extended IP access lists using source and destination addresses and optional protocol type information
•
MAC extended access lists using source and destination MAC addresses and optional protocol type information
As with router ACLs, the switch examines ACLs associated with features configured on a given interface and permits or denies packet forwarding based on how the packet matches the entries in the ACL. In the example in Figure 37-1, if all workstations were in the same VLAN, ACLs applied at the Layer 2 input would allow Host A to access the Human Resources network, but prevent Host B from accessing the same network.
When you apply a port ACL to a trunk port, the ACL filters traffic on all VLANs present on the trunk port. When you apply a port ACL to a port with voice VLAN, the ACL filters traffic on both data and voice VLANs.
With port ACLs, you can filter IP traffic by using IP access lists and non-IP traffic by using MAC addresses. You can filter both IP and non-IP traffic on the same Layer 2 interface by applying both an IP access list and a MAC access list to the interface.

Note
You cannot apply more than one IP access list and one MAC access list to a Layer 2 interface. If an IP access list or MAC access list is already configured on a Layer 2 interface and you apply a new IP access list or MAC access list to the interface, the new ACL replaces the previously configured one.
10-22-2012 12:41 PM
ACL's worked great. Thanks for the info.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide