Pvlan Modes Over Gigabit Etherchannel - Cisco Catalyst 4500 Series Software Configuration Manual

Cisco ios xe release 3.9.xe and cisco ios release 15.2(5)ex
Hide thumbs Also See for Catalyst 4500 Series:
Table of Contents

Advertisement

About Private VLANs

PVLAN Modes Over Gigabit Etherchannel

Beginning with Cisco IOS Release 15.0(2)SG you can configure PVLAN modes over Etherchannel.
These new modes are:
The process of bundling ports has not changed. PVLAN modes are added to already existing modes such
as access, trunk, routed, tunneled etc.
Feature interactions include:
For details on configuring PVLANs over EtherChannel, Refer to the section
EtherChannel" section on page
Private-VLAN Interaction with Other Features
PVLANs have specific interaction with some other features, described in these sections:
For details, see the section "PVLAN Configuration Guidelines and Restrictions" on page 12.
PVLANs and VLAN ACL/QoS
PVLAN ports use primary and secondary VLANs, as follows:
Catalyst 4500 Series Switch, Cisco IOS Software Configuration Guide - Cisco IOS XE 3.9.xE and IOS 15.2(5)Ex
47-8
Host mode - Isolated, Community and 2-way community
Promiscuous mode
Secondary Isolated trunks
Promiscuous trunks
A primary VLAN can be associated with multiple community and twoway-community VLANs, but
only one isolated VLAN.
An isolated or community VLAN or 2-way community VLAN can be associated with only one
primary VLAN.
If you delete a VLAN used in a PVLAN configuration, the PVLAN ports associated with the VLAN
become inactive.
The default native VLAN for promiscuous trunk port is VLAN 1 (management VLAN). All
untagged packets are forwarded in the native VLAN. Either the primary VLANs or a regular VLAN
can be configured as the native VLAN.
No default native VLAN set exists on an isolated secondary trunks. All untagged packets are
dropped, if no native VLAN is configured.
Community and twoway-community VLANs cannot be propagated or carried over PVLAN trunks.
For IGMP Snooping, IGMP reports are learned on the primary VLAN and the platform decides if
packet must be forwarded in the primary or secondary VLANs.
PVLANs and VLAN ACL/QoS, page 47-8
PVLANs and Unicast, Broadcast, and Multicast Traffic, page 47-9
PVLANs and SVIs, page 47-10
Per-Virtual Port Error-Disable on PVLANs, page 47-10
A packet received on a PVLAN host port belongs to the secondary VLAN.
47-24.
Chapter 47
Configuring Private VLANs
"Configuring PVLAN over

Advertisement

Table of Contents
loading

Table of Contents