Multiple VLAN Networks missing on ACL rules
I've created a network with multiple VLAN ID's. However, when I'm trying to create an ACL rule to prevent other VLAN's to communicate with my new VLAN's.
Network: Test
Purpose: Interface
VLAN Type: Multiple VLAN
VLAN: 5-6
On the profiles of ports I can select which VLAN is tagged and untagged. Also the VLAN's from the Multiple VLAN networks will appear as "Test (5)" and "Test (6)". So I can control which VLAN is allowed to communicate through that port.
On Network Security -> ACL -> Gateway ACL. I can set a restriction of the network "Test" to a selected Network. Though, I cannot restrict access based on the VLAN.
On Network Security -> ACL - > Switch ACL. I can select a VLAN as binding type. Which means I could restrict access to specific networks I thought. But the network "Test" is missing from the list of networks. Even if I chose to bind the ACL to all Ports instead of VLAN's. Same problem goes for the EAP ACL.
My intention:
- IoT devices in an VLAN using wired and wireless methods.
- These IoT devices may not communicate with other VLAN's
- A VLAN in the same IP range as the IoT devices due to some technical reasons where a group of devices are connected on. And access to other VLANs
- A VLAN in the same IP range as the IoT devices due to some technical reasons where a group of devices are connected on. And with restricted access to other VLAN's
- Wireless VLAN distribution using PPSK