Thanks for the response, after enabling this on each VLAN i then ran wireshark on two PC's in separate subnets.
The results; Netbios broadcasts from PC's were contained within their VLANs and i WOL broadcast sent to PC's in one subnet was not seen in another. I am hoping this is correct, i have not been able to get ACL's working to prevent unwanted access to SSH onto the switch let alone this!
A simple deny any any and placed under an int vlan config with ip access-list 1 in - will not prevent SSH access, i can still remote in!
I have been able to do this quite easily on a Cisco.
WOL seems to be working to the best of it's ability, where PC's actually respond to the packet.
And from what I could tell, broadcast traffic was contained within each subnet, ARPs from PC's remained within their network and WOL packets from SCCM went to the correct subnets and not the others.
shankm
20 Posts
0
June 30th, 2016 17:00
Thanks for the response, after enabling this on each VLAN i then ran wireshark on two PC's in separate subnets.
The results; Netbios broadcasts from PC's were contained within their VLANs and i WOL broadcast sent to PC's in one subnet was not seen in another. I am hoping this is correct, i have not been able to get ACL's working to prevent unwanted access to SSH onto the switch let alone this!
A simple deny any any and placed under an int vlan config with ip access-list 1 in - will not prevent SSH access, i can still remote in!
I have been able to do this quite easily on a Cisco.
shankm
20 Posts
0
July 6th, 2016 18:00
WOL seems to be working to the best of it's ability, where PC's actually respond to the packet.
And from what I could tell, broadcast traffic was contained within each subnet, ARPs from PC's remained within their network and WOL packets from SCCM went to the correct subnets and not the others.