<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port isolation in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-isolation/m-p/60884#M17704</link>
    <description>&lt;P&gt;Can’t help you with your problem but if this vlan spans across several different switches, then port isolation is not the way to go anyways… Private VLAN would be the best solution here or ACLs.&lt;/P&gt;</description>
    <pubDate>Wed, 24 Feb 2021 00:31:00 GMT</pubDate>
    <dc:creator>Stefan_K_</dc:creator>
    <dc:date>2021-02-24T00:31:00Z</dc:date>
    <item>
      <title>Port isolation</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-isolation/m-p/60883#M17703</link>
      <description>&lt;P&gt;I would like to isolate some of my clients from other clients in the same VLAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need each isolated client to be able to:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Receive DHCP from DHCP server&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;Access the internet&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;But I need each isolated client not to be able to talk in any way to the other isolated clients&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would also like to be able to ping the isolated clients from my laptop on a port that is not isolated for monitoring&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have tried to simulate this using eg:&lt;/P&gt;&lt;P&gt;configure ports 33 isolation on&lt;/P&gt;&lt;P&gt;configure ports 34&amp;nbsp;isolation on&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I plug two laptops into 33 and 34 and run wireshark on the laptop on port 34 I can see some broadcast messages from coming from the laptop in port 33&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I missing something - is my design OK?&lt;/P&gt;&lt;P&gt;Or do I need to restart the switch or something after issueing the command?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Switch type:&amp;nbsp;X440G2-48td-10G&lt;/P&gt;&lt;P&gt;Version: 21.1.4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for any help!&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2021 00:23:29 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-isolation/m-p/60883#M17703</guid>
      <dc:creator>jamesrdelaney</dc:creator>
      <dc:date>2021-02-24T00:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: Port isolation</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-isolation/m-p/60884#M17704</link>
      <description>&lt;P&gt;Can’t help you with your problem but if this vlan spans across several different switches, then port isolation is not the way to go anyways… Private VLAN would be the best solution here or ACLs.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2021 00:31:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-isolation/m-p/60884#M17704</guid>
      <dc:creator>Stefan_K_</dc:creator>
      <dc:date>2021-02-24T00:31:00Z</dc:date>
    </item>
    <item>
      <title>Re: Port isolation</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-isolation/m-p/60885#M17705</link>
      <description>&lt;P&gt;Hi Stefan&lt;/P&gt;&lt;P&gt;So port isolation only works on a single switch?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2021 23:42:14 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-isolation/m-p/60885#M17705</guid>
      <dc:creator>jamesrdelaney</dc:creator>
      <dc:date>2021-02-24T23:42:14Z</dc:date>
    </item>
    <item>
      <title>Re: Port isolation</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-isolation/m-p/60886#M17706</link>
      <description>&lt;P&gt;If you use port isolation in two switches and connect them via a distribution switch, the clients on one switch will still see the clients on the other one unless the dist also uses isolation. If you cascade the switches (no dist between them), you can isolate the downlink to the “downstream” switch in the “upstream” switch, but it will not work if you use EAPS or RSTP for redundancy.&lt;/P&gt;&lt;P&gt;If you still see broadcasts between two isolated ports, this feature may not be very good. I’d recommend upgrading to a recent EXOS before experimenting further. Right now, &lt;A href="https://documentation.extremenetworks.com/release_notes/ExtremeXOS/30.7.1-Patch1-54/" target="_blank" rel="nofollow noreferrer noopener"&gt;EXOS 30.7.1.1-patch1-54&lt;/A&gt; is recommended for X440-G2 and &lt;A href="https://documentation.extremenetworks.com/release_notes/ExtremeXOS/31.2/?_ga=2.31602238.1679049190.1614609371-1179638536.1604529798" target="_blank" rel="nofollow noreferrer noopener"&gt;EXOS 31.2.1.1&amp;nbsp; &lt;/A&gt;is the “Recommended Latest Feature Release”. I’d go for 31.2.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Mar 2021 00:38:15 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/port-isolation/m-p/60886#M17706</guid>
      <dc:creator>FredrikB</dc:creator>
      <dc:date>2021-03-02T00:38:15Z</dc:date>
    </item>
  </channel>
</rss>

