Port Isolation - Planet SGS-5220-24P2X User Manual

L2+24-port 10/100/1000t+4-port shared sfp+2-port 10g sfp+ managed stackable switch sgs-5220 series
Hide thumbs Also See for SGS-5220-24P2X:
Table of Contents

Advertisement

4.6.6 Port Isolation

Overview
When a VLAN is configured to be a private VLAN, communication between ports within that VLAN can be prevented. Two
application examples are provided in this section:
 Customers connected to an ISP can be members of the same VLAN, but they are not allowed to communicate with each
other within that VLAN.
 Servers in a farm of web servers in a Demilitarized Zone (DMZ) are allowed to communicate with the outside world and
with database servers on the inside segment, but are not allowed to communicate with each other
For private VLANs to be applied, the switch must first be configured for standard VLAN operation When this is in place, one or
more of the configured VLANs can be configured as private VLANs. Ports in a private VLAN fall into one of these two groups:
Promiscuous ports
— Ports from which traffic can be forwarded to all ports in the private VLAN
— Ports which can receive traffic from all ports in the private VLAN
Isolated ports
— Ports from which traffic can only be forwarded to promiscuous ports in the private VLAN
— Ports which can receive traffic from only promiscuous ports in the private VLAN
User's Manual of SGS-5220 Series
119

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sgs-5220-24t2x

Table of Contents