Hi folks, so I don't know if this is possible with the 1920, but figured I would ask
I have an HP 1920 L2 switch and a pfSense firewall (Dell R210 II) and I want to create a few VLAN's that can block communication between clients on the same VLAN.
For example, a Camera VLAN that blocks device-to-device except the NVR (in another VLAN), and a Public VLAN that also blocks device-to-device but allows internet connectivity (physical ports for public terminal PC's, AND tagged WLAN). I have both networks up and the pfSense firweall blocks vlan to vlan communication, but obviously does not block client intercommunication within a vlan.
I have never done this before, let alone with a lowly HP 1920 (does everything else I need up till this point).
Is this the correct procedure? Configure static routes --> then configure ACL's, create a QoS Classifier, a Behavior, and then I can create a port policy to map to specific switch ports. Damn, that seems complicated..... Is this easier with a true L3 switch??
https://vmfocus.com/2012/09/26/how-to-configure-layer-3-static-routes-vlans-on-hp-v1910-24g/
https://achilleanblog.wordpress.com/2016/05/29/hp-1920-vlans-and-acls/
No comments:
Post a Comment