Cisco 6500 Series Software Configuration Manual page 145

Hide thumbs Also See for 6500 Series:
Table of Contents

Advertisement

Chapter 10
Configuring Private VLANs
Do not configure private VLAN ports as EtherChannels. While a port is part of the private VLAN
configuration, any EtherChannel configuration for it is inactive.
Destination SPAN configuration supersedes private VLAN configuration. While a port is a
destination SPAN port, any private VLAN configuration for it is inactive.
Private VLANs support the following SPAN features:
For more information about SPAN, see
A primary VLAN can have one isolated VLAN and multiple community VLANs associated with it.
An isolated or community VLAN can have only one primary VLAN associated with it.
Enable PortFast and BPDU guard on isolated and community ports to prevent STP loops due to
misconfigurations and to speed up STP convergence (see
Features"). When enabled, STP applies the BPDU guard feature to all PortFast-configured Layer 2
LAN ports.
If you delete a VLAN used in the private VLAN configuration, the private VLAN ports associated
with the VLAN become inactive.
12-Port Restriction:
Within groups of 12 ports (1–12, 13–24, 25–36, and 37–48), do not configure ports as isolated or
community VLAN ports when one port within the 12 ports is a trunk or a SPAN destination or a
promiscuous private VLAN port. While one port within the 12 ports is a trunk or a SPAN destination
or a promiscuous private VLAN port, any isolated or community VLAN configuration for other
ports within the 12 ports is inactive. To reactivate the ports, remove the isolated or community
VLAN port configuration and enter shutdown and no shutdown commands.
24-Port Restriction:
In all releases, this "24-port restriction" applies to the WS-X6548-GE-TX and WS-X6148-GE-TX
10/100/1000 Mb Ethernet switching modules: within groups of 24 ports (1–24, 25–48), do not
configure ports as isolated or community VLAN ports when one port within the 24 ports is a trunk
or a SPAN destination or a promiscuous private VLAN port. While one port within the 24 ports is a
trunk or a SPAN destination or a promiscuous private VLAN port, any isolated or community VLAN
configuration for other ports within the 24 ports is inactive. To reactivate the ports, remove the
isolated or community VLAN port configuration and enter shutdown and no shutdown commands.
Private VLAN ports can be on different network devices as long as the devices are trunk connected
and the primary and secondary VLANs have not been removed from the trunk.
78-14099-04
You can configure a private VLAN port as a SPAN source port.
You can use VLAN-based SPAN (VSPAN) on primary, isolated, and community VLANs, or use
SPAN on only one VLAN to separately monitor egress or ingress traffic.
In all releases, the "12-port restriction" applies to these 10 Mb, 10/100 Mb, and 100 Mb
Ethernet switching modules: WS-X6324-100FX, WS-X6348-RJ-45, WS-X6348-RJ-45V,
WS-X6348-RJ-21V, WS-X6248-RJ-45, WS-X6248A-TEL, WS-X6248-TEL,
WS-X6148-RJ-45, WS-X6148-RJ-45V, WS-X6148-45AF, WS-X6148-RJ-21,
WS-X6148-RJ-21V, WS-X6148-21AF, WS-X6024-10FL-MT.
In releases earlier than Release 12.1(19)E, the "12-port restriction" applies to these Ethernet
switching modules: WS-X6548-RJ-45, WS-X6548-RJ-21, WS-X6524-100FX-MM.
In Release 12.1(19)E and later releases, the "12-port restriction" does not apply to these
Ethernet switching modules: WS-X6548-RJ-45, WS-X6548-RJ-21, WS-X6524-100FX-MM
(CSCea67876).
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
Private VLAN Configuration Restrictions and Guidelines
Chapter 34, "Configuring Local SPAN and RSPAN."
Chapter 16, "Configuring Optional STP
10-3

Advertisement

Table of Contents
loading

Table of Contents