We had this requirement without using vlans. pfSense is somewhat feature
limited when using vlans.
Cisco can support it without vlans, you'll want to look into the
following commands..
Cisco Switches - "switchport protected"
Cisco Access Points - "Public Secure Packet Forwarding"
Adam
Chris Buechler wrote:
On Sun, Jan 25, 2009 at 1:32 AM, Paul <[email protected]> wrote:
Not real familiar on how to accomplish this. Is there an easy way to isolate
network traffic so that any computer connected can only pass traffic to the
router and internet but not any other computer on the network.
i.e. Infected computers cannot infect other computers on the network.
The firewall can't affect that traffic, it'll have to be done in your
switch. Or you could put each switch port on its own VLAN and trunk
the VLANs to pfSense.
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]
Commercial support available - https://portal.pfsense.org
------------------------------------------------------------------------
No virus found in this incoming message.
Checked by AVG - http://www.avg.com
Version: 8.0.176 / Virus Database: 270.10.13/1912 - Release Date: 1/23/2009 6:54 PM
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]
Commercial support available - https://portal.pfsense.org