How to Limit Intra-VLAN Traffic

preview_player
Показать описание

CBT Nuggets trainer Keith Barker demonstrates how to limit peer-to-peer traffic between devices in the same VLAN.

Imagine you have more than twenty devices on one VLAN. It's possible for devices to get malware or have a malicious user conduct reconnaissance. This can be prevented. If you are sure you don’t want devices in the same VLAN to communicate directly with each other, you can execute this using the Fortinet FortiSwitch with just a few clicks. Keith Barker walks you through this very process: verifying communications within a VLAN between devices, enabling the feature to separate them, and verifying that after you have implemented the feature of an access VLAN, that the devices cannot communicate with each other. Follow this process to prevent the spreading of malware within a VLAN.

Earning the Fortinet NSE 6 requires passing four exams – it's up to you which Fortinet technologies you emphasize in and test on. This course prepares you for the FortiSwitch exam, the Fortinet certification exam that will test you on managing, provisioning, configuring and operating FortiSwitch.

-----------------
Connect with CBT Nuggets for the latest in IT training:
Рекомендации по теме
Комментарии
Автор

I thought this was gonna be a video on private VLANs - but that was good nonetheless. I am completely out of it re: DAI and DHCP snooping in FGT or Cisco environments so I guess I need to look at your older videos to get caught up there.

SoulJah
Автор

How can we limit the storm for example some infected computer sending alot of traffic how to control that so that they don't choke up the entire vlan ? like allowing it but not effecting the entire network or subnet or that vlan ?

jalalhaider
Автор

More over can u make a video on 802.1X where we can use some software solution to control the network access alot of people talk about it but no one ever demonstrated how to do it, it's easy to say purchase a expensive NAC Device but is there some other solution to this problem where one can set-up 802.1x in any network? Like we have a TOR switch then distribution switch then access switches so how to do it ?

jalalhaider
Автор

How would you know a device was infected in time for this solution to really help you?

aaronlewis
Автор

Can Intra-vlan traffic be block on a cisco switch ?

jerryjacob
Автор

Felicidades, es un buen ejemplo. 223 sentadillas son unos GIRLS18.Uno muchas y un buen ejercicio. Se deja ver que hay muy buenos resultados 😍👍 Saludos desde la Cd.. de world 🌹😉💖 los mortalesd abian apreciado tan hermosa mujer.k

svintabrantla