I am looking for info on isolating VLAN traffic so that it only goes to the gateway/fw, or to a specified application server, but isolates the traffic from the rest of the network.
I want to deploy a solution for internet access for kiosk pc's and in conference rooms for visiting presenters/educators where they will need internet access but will be denied access to the rest of the network.
Can any Cisco gurus give me a hand on how I could accomplish this on a 2950G?
Also in a separate scenario I would like to create another VLAN only giving access to a specified application server, the domain controller for authentication and the internet but denying all other traffic. This is on a Baystack 450. These machines will be using static IP's so DHCP is not an issue.
Do I just create a VLAN and only grant access to those IP's in the ACL? is it that simple? Reason for my conundrum is I was always told that the 2950 is not capable of an isolation VLAN, or is this not the technical definition of an isolation VLAN? Can anyone give me a hand?
I want to deploy a solution for internet access for kiosk pc's and in conference rooms for visiting presenters/educators where they will need internet access but will be denied access to the rest of the network.
Can any Cisco gurus give me a hand on how I could accomplish this on a 2950G?
Also in a separate scenario I would like to create another VLAN only giving access to a specified application server, the domain controller for authentication and the internet but denying all other traffic. This is on a Baystack 450. These machines will be using static IP's so DHCP is not an issue.
Do I just create a VLAN and only grant access to those IP's in the ACL? is it that simple? Reason for my conundrum is I was always told that the 2950 is not capable of an isolation VLAN, or is this not the technical definition of an isolation VLAN? Can anyone give me a hand?