One of our clients has three Catalyst 6000 switches and one 3524-XL switch. We have a separate VLAN set up on the switches for a specific application which is most directly connected to the 3524-XL. One of the NT servers has two NICs -- one on the main VLAN, and one on the second VLAN. This particular server has RRAS installed, and has IP forwarding selected. (I've tried disabling IP forwarding, but it tends to make my VPN connections to the network useless!) This particular server also backs up data from the second VLAN.
We need to prevent users in the main VLAN from accessing anything that's on the second VLAN. Normally, I'd say just disable IP forwarding, since that's what's allowing the traffic to make it from one to the other. But as I mentioned above, that IP forwarding is necessary -- to a very limited user group. (Me, mainly, and any other admin.)
Here's the question:
Is it possible to restrict VLAN-to-VLAN traffic by either MAC or IP address, or by some other means? I'd like to be able to do it this way, rather than recommend the client go out and purchase new switches.
Thanks!
Dan
We need to prevent users in the main VLAN from accessing anything that's on the second VLAN. Normally, I'd say just disable IP forwarding, since that's what's allowing the traffic to make it from one to the other. But as I mentioned above, that IP forwarding is necessary -- to a very limited user group. (Me, mainly, and any other admin.)
Here's the question:
Is it possible to restrict VLAN-to-VLAN traffic by either MAC or IP address, or by some other means? I'd like to be able to do it this way, rather than recommend the client go out and purchase new switches.
Thanks!
Dan