Answer the question
In order to leave comments, you need to log in
Cisco SG300. How to solve the problem with access and trunk ports and routing between vlan?
Standard config:
config-file-header
v1.3.7.18 / R750_NIK_1_35_647_358
CLI v1.0
set system mode router
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
!
exit
vlan database
vlan 1,101,102
exit
ip dhcp relay address 192.168.0.2
ip dhcp relay enable
bonjour interface range vlan 1
ip ssh server
!
interface vlan 1
name Server
ip address 192.168.0.1 255.255.255.0
!
interface vlan 101
name User
ip address 192.168.1.1 255.255.255.0
ip dhcp relay enable
!
interface vlan 102
name Guest
ip address 192.168.2.1 255.255.255.0
ip dhcp relay enable
!
interface gigabitethernet1
description Server
switchport access vlan 1
!
interface gigabitethernet2
description User
switchport access vlan 101
!
interface gigabitethernet3
description User-Guest
switchport trunk allowed vlan add 101,102
!
exit
ip access-list extended "vlan102"
permit ip 192.168.2.0 0.0.0.255 any
deny ip any any
It did not help. Answer the question
In order to leave comments, you need to log in
I have not worked with Linksys equipment, but my thoughts are:
1) access between vlans is observed, because, presumably, the SG300 routes traffic between vlans. You can check using (Cisco IOS CLI command, in Linksys the syntax may differ): show ip route
Why, when connecting to Gi2 (if I understood correctly), hosts in other vlans were not available - you need to figure it out separately (probably incorrect default gateway address on the host, connected to this port)
2) If you want to block all traffic on vlan 102 from entering other vlans, try (again, assuming Cisco IOS CLI syntax):
ip access-list extended vlan102-in
ip access-list extended vlan102-out
interface vlan 102
ip access-group vlan102-in in
ip access-group vlan102-out out
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question