Hello,
If you need the block the inter-port communication only for a certain VLAN then I think you can check if using an Access Control List can satisfy your requirements. Basically what you could do is apply an ACL which denies incoming traffic destined to other IP addresses in the same VLAN. That way the workstations will only be able to reach destinations in other VLANs or the internet. If you have some server in the same VLAN that should be reachable you can permit traffic to its IP and deny traffic to all other IPs.
According to the last manual, the switch supports port ACL and VLAN ACL.
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04490670&withFrame
Static ACLs
Static ACLs are configured on the switch. To apply a static ACL, you must assign it to an interface
(VLAN or port).
• VLAN ACL (VACL) A VACL is an ACL configured on a VLAN to filter traffic entering the switch
on that VLAN interface and having a destination on the same VLAN.
• Static port ACL A static port ACL is an ACL configured on a port to filter traffic entering the
switch on that port, regardless of whether the traffic is routed, switched, or addressed to a
destination on the switch itself.
You are trying to restrict switched traffic so both options should be applicable. Since both options can be applied for incomming traffic at the port only (not outgoing), you should use an extended ACL in order to be able to specify which destination should be reachable and which not.
You have to keep in mind that the ACLs have an implicit deny rule as last statement. You should make sure that you add a rule at the end of the list permiting all traffic not mathing your restricting rule, permit ip any any.