konqueror
IS-IT--Management
- Aug 29, 2012
- 1
I manage IP-PBX(VoIP) in my work place which is consists of switches and a router as shown below
------------------------------------------------------------
IP-PBX - Backbone(3Com 8810) - Cisco 7200 - outward router
------------------------------------------------------------
Morever, I have 3 Vlans that Vlan ID 1(Data only, tagged), Vlan ID 40, 41(VoIP, untagged)
My intend is to seprate between Vlan 1 and Vlan 40, 41.
(no packet exchange between vlan 1 <-> vlan 40,41)
the Vlan 1 has C class 1 and Vlan 40,41 has C class 40,41.
And I found that 3Com 8810 cannot capable of ACL between Vlans
(just able to ACL on ethernet ports)
Therefore I applied an ACL on vlan 40's port(GigabitEthernet1/1/1-1/1/18)
as shown belpw
rule 1 deny ip source X.X.1.0 0.0.0.255 destination X.X.40.0 0.0.0.255
However, the above deny rule is not working.
what should I do to deny packets between C class 1 and C class 40, 41?
------------------------------------------------------------
IP-PBX - Backbone(3Com 8810) - Cisco 7200 - outward router
------------------------------------------------------------
Morever, I have 3 Vlans that Vlan ID 1(Data only, tagged), Vlan ID 40, 41(VoIP, untagged)
My intend is to seprate between Vlan 1 and Vlan 40, 41.
(no packet exchange between vlan 1 <-> vlan 40,41)
the Vlan 1 has C class 1 and Vlan 40,41 has C class 40,41.
And I found that 3Com 8810 cannot capable of ACL between Vlans
(just able to ACL on ethernet ports)
Therefore I applied an ACL on vlan 40's port(GigabitEthernet1/1/1-1/1/18)
as shown belpw
rule 1 deny ip source X.X.1.0 0.0.0.255 destination X.X.40.0 0.0.0.255
However, the above deny rule is not working.
what should I do to deny packets between C class 1 and C class 40, 41?