Just a question please, this lab is the same as PVLAN in Switching CCNP, but the course should be for CCIE, so i am a little confused , what did you add to this course as an CCIE ? or it is only a review for the PVLAN . can you please clarified ?
Hi Rene,
Thanks for the explanation is very clear. My question is:
Who is going to use private vlans? If you can configure access-lists to block or allow traffic
I havenât ever had to configure private-vlans but I had configure access-lists.
Please advise
Alfredo,
Private VLANs are often implemented in shared environments where multiple, independent entities need the same IP space, but should be isolated from each other (ISP co-location, for example). Access-lists wonât really work if you are trying to keep two machines isolated from each other within the same IP subnet, and MAC based ACLs can get messy.
Can you have more than one promiscuous port? If yes - What if you wanted to include additional servers (additional ports). Let say you had 5 servers (fa0/20, fa0/21, fa0/22, fa0/23, fa0/24). Would you have to config each interface separately or could you just do something like this?
You have primary VLAN 500, community VLAN 501, Isolation VLAN 502⌠If all this (primary VLAN 500) had a layer 3 switch connection (promiscuous port)⌠would they be able to communicate through the Layer 3 switch?
Letâs say we have a request to add a private vlan on an access switch. Access switch connects to core, core is connected to a firewall. In some cases, the SVI between the core and firewall are already configured as a normal vlan. If we add a primary vlan config under this interface (SVI) will it change it to a primary and a regular vlan? Is this possible? Or will it become a âprimaryâ vlan for the secondary private vlan and loose its prior connfig? Whats the best method to implement a private vlan to an already existing access switch, that is connected in the same fashion I mentioned earlier without breaking anything? Assuming the SVI connected to the fireall is default gateway for hosts to the internet? I hope I correctly explained myself.
When you configure a VLAN as the primary VLAN then it will be primary. It canât be the primary and âregularâ VLAN at the same time. When you want to migrate to a private VLANâŚdo it when nobody is around, itâs easy to break stuff
Do you want to use private VLANs to prevent server-to-server traffic? If so, I would configure a new VLAN as the primary VLAN with some new secondary VLANs. Assign some unused switchports to it, see if it works. Configure the interface that connects to the firewall as the promiscuous port. When it works, you can assign the switchports from the servers in the âregularâ VLAN to your new secondary VLAN.
Great thanks Rene, ended up using a VACL instead as it wouldnât break anything and wouldnât require a change control. Iâm sure this will come up eventually though