<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Isolate hosts in the same vlan in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44890#M11102</link>
    <description>Hello Martin,&lt;BR /&gt;
&lt;BR /&gt;
you can use policies on the S-Series, the same idea as the ACL solution for EXOS above.&lt;BR /&gt;
&lt;BR /&gt;
Br,&lt;BR /&gt;
Erik</description>
    <pubDate>Tue, 05 Jul 2016 19:16:00 GMT</pubDate>
    <dc:creator>Erik_Auerswald</dc:creator>
    <dc:date>2016-07-05T19:16:00Z</dc:date>
    <item>
      <title>Isolate hosts in the same vlan</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44880#M11092</link>
      <description>Hi &lt;BR /&gt;
&lt;BR /&gt;
this is the scenario:&lt;BR /&gt;
&lt;BR /&gt;
- one single vlan &lt;BR /&gt;
- I need hosts that access this vlan to be able only to reach the gateway. Communication between hosts in the same vlan should be blocked. Is it possible in Xos?&lt;BR /&gt;
&lt;BR /&gt;
thanks&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Oct 2015 09:54:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44880#M11092</guid>
      <dc:creator>Localhost</dc:creator>
      <dc:date>2015-10-27T09:54:00Z</dc:date>
    </item>
    <item>
      <title>RE: Isolate hosts in the same vlan</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44881#M11093</link>
      <description>&lt;A href="http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&amp;amp;#38;cmd=displayKC&amp;amp;#38;externalId=2077275" target="_blank" rel="nofollow noreferrer noopener"&gt;http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&amp;amp;cmd=displayKC&amp;amp;externalId=2077275&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Oct 2015 10:13:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44881#M11093</guid>
      <dc:creator>Jeremy_Gibbs</dc:creator>
      <dc:date>2015-10-27T10:13:00Z</dc:date>
    </item>
    <item>
      <title>RE: Isolate hosts in the same vlan</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44882#M11094</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
Private VLAN,  helps to achieve  this scenario (port isolation), is a technique  where a VLAN contains switch ports that are restricted such that they can only communicate with a given "uplink" &lt;BR /&gt;
&lt;BR /&gt;
thanks&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Oct 2015 10:14:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44882#M11094</guid>
      <dc:creator>Baskar</dc:creator>
      <dc:date>2015-10-27T10:14:00Z</dc:date>
    </item>
    <item>
      <title>RE: Isolate hosts in the same vlan</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44883#M11095</link>
      <description>thanks !&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Oct 2015 10:17:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44883#M11095</guid>
      <dc:creator>Localhost</dc:creator>
      <dc:date>2015-10-27T10:17:00Z</dc:date>
    </item>
    <item>
      <title>RE: Isolate hosts in the same vlan</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44884#M11096</link>
      <description>Hi!&lt;BR /&gt;
&lt;BR /&gt;
Also (as workaround) you can try ACL (but this have to be tested).&lt;BR /&gt;
For example:&lt;BR /&gt;
ports 1,2,3 - hosts.&lt;BR /&gt;
#edit pol XXX&lt;BR /&gt;
entry permit_def_gate {&lt;BR /&gt;
if {&lt;BR /&gt;
destination-address 172.16.0.1/24; #default gateway&lt;BR /&gt;
} then {&lt;BR /&gt;
permit;&lt;BR /&gt;
} }&lt;BR /&gt;
entry deny_inter-hosts {&lt;BR /&gt;
if {&lt;BR /&gt;
destination-address 172.16.0.0/24; #other hosts&lt;BR /&gt;
} then {&lt;BR /&gt;
deny; &lt;BR /&gt;
} }&lt;BR /&gt;
&lt;BR /&gt;
#conf access-list XXX ports 1-3 ingress</description>
      <pubDate>Tue, 27 Oct 2015 12:50:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44884#M11096</guid>
      <dc:creator>Alexandr_P</dc:creator>
      <dc:date>2015-10-27T12:50:00Z</dc:date>
    </item>
    <item>
      <title>RE: Isolate hosts in the same vlan</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44885#M11097</link>
      <description>One quick tweak to the ACL:&lt;BR /&gt;
&lt;BR /&gt;
entry permit_def_gate {&lt;BR /&gt;
if {&lt;BR /&gt;
&lt;B&gt;destination-address 172.16.0.1/32;&lt;/B&gt; #default gateway&lt;BR /&gt;
} then {&lt;BR /&gt;
permit;&lt;BR /&gt;
} }&lt;BR /&gt;
entry deny_inter-hosts {&lt;BR /&gt;
if {&lt;BR /&gt;
destination-address 172.16.0.0/24; #other hosts&lt;BR /&gt;
} then {&lt;BR /&gt;
deny; &lt;BR /&gt;
} }If this line had a /24 mask, it would match on all hosts in the subnet, rather than just the gateway.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Oct 2015 12:50:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44885#M11097</guid>
      <dc:creator>BrandonC</dc:creator>
      <dc:date>2015-10-27T12:50:00Z</dc:date>
    </item>
    <item>
      <title>RE: Isolate hosts in the same vlan</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44886#M11098</link>
      <description>To summarize a bit:&lt;BR /&gt;
&lt;BR /&gt;
- if this requirement is local to a single switch (stack), then Port Isolation is certainly the best way to go.&lt;BR /&gt;
- if the VLAN spans multiple switches, the usual Private VLAN is the way to go.&lt;BR /&gt;
- ACL can be a workaround, especially if you want some lattitude in your initial requirement&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Oct 2015 13:23:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44886#M11098</guid>
      <dc:creator>Stephane_Grosj1</dc:creator>
      <dc:date>2015-10-27T13:23:00Z</dc:date>
    </item>
    <item>
      <title>RE: Isolate hosts in the same vlan</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44887#M11099</link>
      <description>Hello there is another potential but it depends on your network and what features you actually need.  There is a feature called Upstream Forwarding or Upstream Forwarding Only (UFO) that allows ports to be on the same VLAN but their traffic can only go up the uplink port.  We disable flooding to the other ports so that a user on one port can't see traffic from another user on another port.  This features is used mainly in MAN networks or Fiber to the Home designs where SPs want to restrict user traffic.&lt;BR /&gt;
&lt;BR /&gt;
It is in the user guide search for upstream forwarding here's s snippet&lt;BR /&gt;
&lt;BR /&gt;
"Figure 87: Upstream Forwarding or Disabling Egress Flooding Example"&lt;BR /&gt;
"In this example, the three ports are in an ISP-access VLAN. Ports 1 and 2 are connected to clients 1 and"&lt;BR /&gt;
"2, respectively, and port 3 is an uplink to the ISP network. Because clients 1 and 2 are in the same VLAN, client 1 could possibly learn about the other client’s traffic by sniffing client 2’s broadcast traffic; client 1 could then possibly launch an attack on client 2."&lt;BR /&gt;
"However, when you disable all egress flooding on ports 1 and 2, this sort of attack is impossible, for the"&lt;BR /&gt;
"following reasons:"&lt;BR /&gt;
"•  Broadcast  and multicast traffic from the clients is forwarded  only to the uplink port."&lt;BR /&gt;
"•  Any packet with unlearned  destination MAC addresses is forwarded  only to the uplink port."&lt;BR /&gt;
"•  One client cannot learn any information from the other client. Because egress flooding is disabled on the access ports, the only packets  forwarded  to each access port are those packets  that are specifically targeted for one of the ports. There is no traffic leakage."&lt;BR /&gt;
"In this way, the communication between client 1 and client 2 is controlled. If client 1 needs to"&lt;BR /&gt;
"communicate with client 2 and has that IP address, client 1 sends out an ARP request to resolve the IP"&lt;BR /&gt;
"address  for client 2."&lt;BR /&gt;
&lt;BR /&gt;
There are pros and cons with using this over private VLAN and really comes down with what you need to do but it is an option&lt;BR /&gt;
&lt;BR /&gt;
Thanks&lt;BR /&gt;
P&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Oct 2015 22:13:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44887#M11099</guid>
      <dc:creator>Paul_Russo</dc:creator>
      <dc:date>2015-10-27T22:13:00Z</dc:date>
    </item>
    <item>
      <title>RE: Isolate hosts in the same vlan</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44888#M11100</link>
      <description>very valuable information. I will keep this thread in mind even for the future. &lt;BR /&gt;
&lt;BR /&gt;
thanks everybody!&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Oct 2015 02:52:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44888#M11100</guid>
      <dc:creator>Localhost</dc:creator>
      <dc:date>2015-10-28T02:52:00Z</dc:date>
    </item>
    <item>
      <title>RE: Isolate hosts in the same vlan</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44889#M11101</link>
      <description>Hi guys,&lt;BR /&gt;
&lt;BR /&gt;
is there a way to realise this on EOS (S-Series) Switches as well?&lt;BR /&gt;
&lt;BR /&gt;
Thanks in advance,&lt;BR /&gt;
Martin&lt;BR /&gt;</description>
      <pubDate>Tue, 05 Jul 2016 16:42:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44889#M11101</guid>
      <dc:creator>MartinS1</dc:creator>
      <dc:date>2016-07-05T16:42:00Z</dc:date>
    </item>
    <item>
      <title>RE: Isolate hosts in the same vlan</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44890#M11102</link>
      <description>Hello Martin,&lt;BR /&gt;
&lt;BR /&gt;
you can use policies on the S-Series, the same idea as the ACL solution for EXOS above.&lt;BR /&gt;
&lt;BR /&gt;
Br,&lt;BR /&gt;
Erik</description>
      <pubDate>Tue, 05 Jul 2016 19:16:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/44890#M11102</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2016-07-05T19:16:00Z</dc:date>
    </item>
    <item>
      <title>Re: RE: Isolate hosts in the same vlan</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/94457#M21725</link>
      <description>&lt;P&gt;I'm a little late to the show but anyway.&lt;/P&gt;&lt;P&gt;Why do you need to specify the default gateway? Traffic exiting the VLAN uses the def GW's MAC address but not its IP address.&lt;/P&gt;&lt;P&gt;You can just deny dst 172.16.0.0/24 and for the rest permit all IPv4&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2023 23:25:04 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/isolate-hosts-in-the-same-vlan/m-p/94457#M21725</guid>
      <dc:creator>jeronimo</dc:creator>
      <dc:date>2023-01-19T23:25:04Z</dc:date>
    </item>
  </channel>
</rss>

